Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro HTML5 and CSS3 Design Patterns (Professional Apress)
Pro HTML5 and CSS3 Design Patterns (Professional Apress)

This is a solutions book for styling HTML5 with CSS3. It contains more than 350 design patterns you can put to use right away. Each design pattern is modular and customizable, and you can combine patterns to create an unlimited number of designs.

Each design pattern has been thoroughly tested and proven to work in all major web...

Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

HTML5 Hacks
HTML5 Hacks
HTML5 is the new catchall term for “the Web.” Like Ajax and Web 2.0 before, the term can cause confusion when used in different contexts. HTML5 is technically the fifth revision of the HTML markup language, but you will find the term being used to describe an umbrella of next-generation web technology...
Hardware Hacking Projects for Geeks
Hardware Hacking Projects for Geeks

Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...

Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux
Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux

The Ubuntu distribution simplifies Linux by providing a sensible collection of applications, an easy-to-use package manager, and lots of fine-tuning, which make it possibly the best Linux for desktops and laptops. Readers of both Linux Journal and TUX Magazine...

Kinect Hacks: Tips & Tools for Motion and Pattern Detection
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
The way we interact with machines is always changing. As technology evolves, new ways of interacting with computers become available to us, one innovative breakthrough after the next. If we go back 10 years, RIM was just starting to implement phone capabilities into their line of Blackberry mobile devices. Now we...
Linux Desktop Hacks
Linux Desktop Hacks

With hacks that any user can follow, Linux Desktop Hacks demonstrates how easy it is to modify Linux to suit your desires. The book is packed with tips on customizing and improving the interface, boosting performance, administering your desktop, and generally making the most out of what X, KDE,...

Spidering Hacks
Spidering Hacks
Written for developers, researchers, technical assistants, librarians, and power users, Spidering Hacks provides expert tips on spidering and scraping methodologies. You'll begin with a crash course in spidering concepts, tools (Perl, LWP, out-of-the-box utilities), and ethics (how to know when you've gone too far:...
CSS Hacks and Filters: Making Cascading Stylesheets Work
CSS Hacks and Filters: Making Cascading Stylesheets Work
Here's how to make CSS work the way it should

Cascading Style Sheets, the technology meant to bring order out of chaos by letting you update Web sites effortlessly, just doesn't always work. You recognize that when you discover your graphics, perfectly positioned in Firefox, throw your page out of whack when viewed in Explorer. The solution?...

PayPal Hacks
PayPal Hacks

PayPal wasn't the first company to build an online payment system, but it might as well be the last. With over 50 million registered accounts, PayPal is rapidly becoming a household name. But, as indicated, there have been others; PayPal's predecessors attempted to capitalize on the Internet boom by building new forms of...

Stealing the Network: How to Own a Shadow
Stealing the Network: How to Own a Shadow
The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress
...
Hacking Google Maps and Google Earth (ExtremeTech)
Hacking Google Maps and Google Earth (ExtremeTech)
Going somewhere? Or just getting back?

 

Great vacation photos—too bad you can't remember where you took them. And wouldn't it have been terrific to find a pizza joint when you bumped into your college buddy in that little ski town? Well, by making Google Maps and Google Earth do your bidding, you can find out not only where...

Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy