 |
|
 iOS Drawing: Practical UIKit Solutions
Apple has lavished iOS with a rich and evolving library of 2D drawing utilities. These APIs include powerful features like transparency, path-based drawing, antialiasing, and more. They offer low-level, lightweight, easy-to-integrate drawing routines that you can harness to build images, to display views, and to print.
... |  |  Computer Science Illuminated
Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Fully revised and updated, the Sixth Edition of the best-selling text Computer Science... |  |  Internet of Things Programming with JavaScript
The Raspberry Pi Zero is a powerful, low-cost, credit-card sized computer, which lends
itself perfectly to begin the controller of sophisticated home automation devices. Using the
available on-board interfaces, the Raspberry Pi Zero can be expanded to allow the
connection of a virtually infinite number of security sensors and... |
|
 The Art of Deception: Controlling the Human Element of Security
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in... |  |  Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing... |  |  Advanced Penetration Testing: Hacking the World's Most Secure Networks
Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by... |
|
|
 Linux Essentials
A unique, full-color introduction to Linux fundamentals
Serving as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and concise, this beginner's guide takes a learning-by-doing approach to understanding the essentials of Linux. Each chapter... |  |  |  |  UNIX System Programming for System VR4 (Nutshell Handbooks)
Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing... |
|
Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 |