Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Begin to Code with Python
Begin to Code with Python

Become a Python programmer–and have fun doing it!

Start writing software that solves real problems, even if you have absolutely no programming experience! This friendly, easy, full-color book puts you in total control of your own learning, empowering you to build...

WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition
Node.js Web Development: Server-side development with Node 10 made easy, 4th Edition

Create a fault-tolerant backend for your real-time applications using Docker, Node.js 10, and MongoDB, and implement HTTPS for hardened security

Key Features

  • Learn server-side programming with JavaScript and Node.js 10
  • Explore the latest JavaScript features and ECMAScript...
Vue.js 2 Design Patterns and Best Practices: Build enterprise-ready, modular Vue.js applications with Vuex and Nuxt
Vue.js 2 Design Patterns and Best Practices: Build enterprise-ready, modular Vue.js applications with Vuex and Nuxt

Become an expert Vue developer by understanding the design patterns and component architecture of Vue.js to write clean and maintainable code.

Key Features

  • Craft highly modular applications by exploring the design patterns and component architecture of Vue.js
  • Enforce a...
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things
Program the Internet of Things with Swift for iOS: Learn How to Program Apps for the Internet of Things

With this book, you will learn how to build apps and hardware for the Internet of Things, using Apple's native APIs and industry standard protocols like Bluetooth and HTTPS. You'll start out learning how to access the sensors on the iPhone, move on to building your own accessories using the Arduino and Raspberry
...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Pro Puppet
Pro Puppet

Pro Puppet, Second Edition, now updated for Puppet 3, is an in-depth guide to installing, using, and developing the popular configuration management tool Puppet.

Puppet provides a way to automate everything from user management to server configuration. You'll learn how Puppet has changed in the latest version, how to use it on...

Coding Games in Scratch: A Step-by-Step Visual Guide to Building Your Own Computer Games
Coding Games in Scratch: A Step-by-Step Visual Guide to Building Your Own Computer Games

Written for children ages 8–12 with little to no coding experience, this straightforward visual guide uses fun graphics and easy-to-follow instructions to show young learners how to build their own computer projects using Scratch, a popular free programming language.

With Coding Games in Scratch, kids can build single...

Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Web Development with Node and Express: Leveraging the JavaScript Stack
Web Development with Node and Express: Leveraging the JavaScript Stack

Learn how to build dynamic web applications with Express, a key component of the Node/JavaScript development stack. In this hands-on guide, author Ethan Brown teaches you the fundamentals through the development of a fictional application that exposes a public website and a RESTful API. You’ll also learn web architecture best...

Result Page: 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy