Home | Amazing | Today | Tags | Publishers | Years | Search 
iOS Drawing: Practical UIKit Solutions
iOS Drawing: Practical UIKit Solutions

Apple has lavished iOS with a rich and evolving library of 2D drawing utilities. These APIs include powerful features like transparency, path-based drawing, antialiasing, and more. They offer low-level, lightweight, easy-to-integrate drawing routines that you can harness to build images, to display views, and to print.

...

Computer Science Illuminated
Computer Science Illuminated

Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.

Fully revised and updated, the Sixth Edition of the best-selling text Computer Science
...

Internet of Things Programming with JavaScript
Internet of Things Programming with JavaScript
The Raspberry Pi Zero is a powerful, low-cost, credit-card sized computer, which lends itself perfectly to begin the controller of sophisticated home automation devices. Using the available on-board interfaces, the Raspberry Pi Zero can be expanded to allow the connection of a virtually infinite number of security sensors and...
The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...

Network Routing: Fundamentals, Applications, and Emerging Technologies
Network Routing: Fundamentals, Applications, and Emerging Technologies

Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...

Advanced Penetration Testing: Hacking the World's Most Secure Networks
Advanced Penetration Testing: Hacking the World's Most Secure Networks

Build a better defense against motivated, organized, professional attacks

Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...

Matlab: A Practical Introduction to Programming and Problem Solving
Matlab: A Practical Introduction to Programming and Problem Solving

MatLab, Third Edition is the only book that gives a full introduction to programming in MATLAB combined with an explanation of the software’s powerful functions, enabling engineers to fully exploit its extensive capabilities in solving engineering problems. The book provides a systematic, step-by-step approach, building on...

Evolutionary Algorithms (The IMA Volumes in Mathematics and its Applications)
Evolutionary Algorithms (The IMA Volumes in Mathematics and its Applications)

The IMA Workshop on Evolutionary Algorithms brought together many of the top researchers in the area of Evolutionary Computation for a week of intensive interaction. The field of Evolutionary Computation has developed significantly over the past 30 years and today consists of a variety of subfields such as genetic algorithms, evolution...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Linux Essentials
Linux Essentials

A unique, full-color introduction to Linux fundamentals

Serving as a low-cost, secure alternative to expensive operating systems, Linux is a UNIX-based, open source operating system. Full-color and concise, this beginner's guide takes a learning-by-doing approach to understanding the essentials of Linux. Each chapter...

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning

Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's...

UNIX System Programming for System VR4 (Nutshell Handbooks)
UNIX System Programming for System VR4 (Nutshell Handbooks)

Any program worth its salt uses operating system services. Even a simple program, if practical, reads input and produces output. And, most applications have more complex needs. They need to find out the time, use the network, or start and communicate with other processes. Systems programming really means nothing more than writing...

Result Page: 85 84 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy