Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations
Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations

If you plan to develop iOS applications in a corporate setting—for internal consumption or for sale to end users—you need to read this book. Veteran developer James Turner shares best practices and lessons learned from his recent on-the-ground experience planning, building, and shipping an iOS application in an enterprise...

Building Solutions with Microsoft Commerce Server 2002
Building Solutions with Microsoft Commerce Server 2002

No matter what your organization sells, a well-executed commerce solution can extend your business globally, boost profitability, and help you seize new opportunities faster. Drawing from their extensive, in-the-field experience, online business experts Clayton Peddy and Derek Armentrout teach you to quickly build and deploy a scalable,...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Disruption by Design: How to Create Products that Disrupt and then Dominate Markets
Disruption by Design: How to Create Products that Disrupt and then Dominate Markets

From Eli Whitney to Henry Ford to Ray Kroc to Steve Jobs, market disruptors have reaped the benefits, including fame and fortune. But do you have to be that rare genius whose unique skills can literally change the world? No. Disrupting a market is a discipline that can be learned. Disruption by Design—a handbook for...

Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Learning ObjectiveC by Developing iPhone Games
Learning ObjectiveC by Developing iPhone Games

Leverage Xcode and ObjectiveC to develop iPhone games

About This Book

  • Get started with the Xcode development environment
  • Dive deep into programming with Objective-C
  • A practical and engaging tutorial to create vintage games such as Space Invaders and Galaga

...

Starling Game Development Essentials
Starling Game Development Essentials

Develop and deploy isometric turn-based games using Starling

Overview

  • Create a cross-platform Starling Isometric game
  • Add enemy AI and multiplayer capability
  • Explore the complete source code for the Web and cross-platform game develpment

In...

Interactive Project Management: Pixels, People, and Process (Voices That Matter)
Interactive Project Management: Pixels, People, and Process (Voices That Matter)

As an industry, interactive is different. The work entails elements of software development, marketing, and advertising, yet it’s neither purely technical nor traditional “agency” work. Delivery methods are different, and because the industry is relatively new, the gap in understanding between the clients buying the work and...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

What's Science Ever Done For Us: What the Simpsons Can Teach Us About Physics, Robots, Life, and the Universe
What's Science Ever Done For Us: What the Simpsons Can Teach Us About Physics, Robots, Life, and the Universe
A playful and entertaining look at science on The Simpsons

This amusing book explores science as presented on the longest-running and most popular animated TV series ever made: The Simpsons. Over the years, the show has examined such issues as genetic mutation, time travel, artificial intelligence, and even aliens.
...
The McGraw-Hill 36-Hour Course: Project Management, Second Edition
The McGraw-Hill 36-Hour Course: Project Management, Second Edition

Schedule and coordinate projects seamlessly, start to finish!

In today's ultracompetitive world of business, those in charge want results on time and on budget--and they're turning to project managers to deliver. Skilled project managers are in high demand, and the profession is growing at an unprecedented rate.

...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy