Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)
iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)

In this book, the world's leading Apple platform development trainers offer a complete, practical, hands-on introduction to iPhone and iPad programming. The authors walk through all the Apple tools and technologies needed to build successful iPhone/iPad/iPod touch apps, including the iOS 4.3 SDK, the Objective-C language, Xcode 4,...

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

ZeroMQ: Messaging for Many Applications
ZeroMQ: Messaging for Many Applications
Dive into ØMq (aka ZeroMq), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system...
The Evolution of Violence (Evolutionary Psychology)
The Evolution of Violence (Evolutionary Psychology)

This volume is an interdisciplinary exploration of our understanding of the causes and consequences of violence. Represented in its chapters are noted scholars from a variety of fields including psychology, anthropology, law, and literature. The contributions reflect a broad scope of inquiry and diverse levels of analysis. With an underlying...

Introducing Gradle
Introducing Gradle

This concise book is a quick start-up primer on the Gradle build and release tool. You'll learn about Gradle and how to set it up to use. You'll learn about the Gradle life cycle and how to effectively leverage and use it. Also, you'll learn the basics of using site plugins and generating Javadocs, test coverage/FindBugs reports,...

Multistate Systems Reliability Theory with Applications
Multistate Systems Reliability Theory with Applications

Most books in reliability theory are dealing with a description of component and system states as binary: functioning or failed. However, many systems are composed of multi-state components with different performance levels and several failure modes. There is a great need in a series of applications to have a more refined description of these...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Patterns of Enterprise Application Architecture
Patterns of Enterprise Application Architecture

The practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented....

Developing IP Multicast Networks: The Definitive Guide to Designing and Deploying CISCO IP Multi- cast Networks
Developing IP Multicast Networks: The Definitive Guide to Designing and Deploying CISCO IP Multi- cast Networks

The definitive guide to designing and deploying Cisco IP multicast networks

  • Clear explanations of the concepts and underlying mechanisms of IP multicasting, from the fundamentals to advanced design techniques
  • Concepts and techniques are reinforced through real-world network examples, each clearly illustrated in a...
Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
Agent-Mediated Electronic Commerce. Automated Negotiation and Strategy Design for Electronic Markets
This book constitutes the thoroughly refereed post-proceedings of the joint International Workshops on Trading Agent Design and Analysis, TADA 2006, and on Agent Mediated Electronic Commerce, AMEC VIII 2006, held in Hakodate, Japan, in May 2006 as an associated event of AAMAS 2006, the 5th International Joint Conference on Autonomous Agents and...
Applications of Graph Transformations with Industrial Relevance: Second International Workshop, AGTIVE 2003, Charlottesville
Applications of Graph Transformations with Industrial Relevance: Second International Workshop, AGTIVE 2003, Charlottesville
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Applications of Graph Transformations with Industrial Relevance, AGTIVE 2003, held in Charlotesville, Virginia, USA in September/October 2003.

The 27 revised full papers and 11 revised demo papers presented together with 2 invited papers and 5...

Numerical Solution of Partial Differential Equations on Parallel Computers
Numerical Solution of Partial Differential Equations on Parallel Computers

Since the dawn of computing, the quest for a better understanding of Nature has been a driving force for technological development. Groundbreaking achievements by great scientists have paved the way from the abacus to the supercomputing power of today. When trying to replicate Nature in the computer’s silicon test tube, there is need...

unlimited object storage image
Result Page: 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy