Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations
Developing Enterprise iOS Applications: iPhone and iPad Apps for Companies and Organizations

If you plan to develop iOS applications in a corporate setting—for internal consumption or for sale to end users—you need to read this book. Veteran developer James Turner shares best practices and lessons learned from his recent on-the-ground experience planning, building, and shipping an iOS application in an enterprise...

Building Solutions with Microsoft Commerce Server 2002
Building Solutions with Microsoft Commerce Server 2002

No matter what your organization sells, a well-executed commerce solution can extend your business globally, boost profitability, and help you seize new opportunities faster. Drawing from their extensive, in-the-field experience, online business experts Clayton Peddy and Derek Armentrout teach you to quickly build and deploy a scalable,...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Disruption by Design: How to Create Products that Disrupt and then Dominate Markets
Disruption by Design: How to Create Products that Disrupt and then Dominate Markets

From Eli Whitney to Henry Ford to Ray Kroc to Steve Jobs, market disruptors have reaped the benefits, including fame and fortune. But do you have to be that rare genius whose unique skills can literally change the world? No. Disrupting a market is a discipline that can be learned. Disruption by Design—a handbook for...

Security for Wireless Ad Hoc Networks
Security for Wireless Ad Hoc Networks
Wireless networks, whether cellular networks or wireless local area networks (LANs), have rapidly become an indispensable part of our life. Evidence of this is the widespread usage of such networks in several areas such as office, home, universities, hot-spots such as airports and hotels etc. In addition, the widespread availability of miniature...
Learning ObjectiveC by Developing iPhone Games
Learning ObjectiveC by Developing iPhone Games

Leverage Xcode and ObjectiveC to develop iPhone games

About This Book

  • Get started with the Xcode development environment
  • Dive deep into programming with Objective-C
  • A practical and engaging tutorial to create vintage games such as Space Invaders and Galaga

...

Starling Game Development Essentials
Starling Game Development Essentials

Develop and deploy isometric turn-based games using Starling

Overview

  • Create a cross-platform Starling Isometric game
  • Add enemy AI and multiplayer capability
  • Explore the complete source code for the Web and cross-platform game develpment

In...

Interactive Project Management: Pixels, People, and Process (Voices That Matter)
Interactive Project Management: Pixels, People, and Process (Voices That Matter)

As an industry, interactive is different. The work entails elements of software development, marketing, and advertising, yet it’s neither purely technical nor traditional “agency” work. Delivery methods are different, and because the industry is relatively new, the gap in understanding between the clients buying the work and...

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first...

Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy