|
|
|
|
GNS3 Network Simulation Guide
Acquire a comprehensive knowledge of the GNS3 graphical network simulator, using it to prototype your network without the need for physical routers
Overview
-
Develop your knowledge for Cisco certification (CCNA, CCNP, CCIE), using GNS3
-
Install GNS3 successfully on Windows, Linux, or OS...
| | Unity Multiplayer Games
Take your gaming development skills into the online multiplayer arena by harnessing the power of Unity 4 or 3. This is not a dry tutorial - it uses exciting examples and an enthusiastic approach to bring it all to life.
Overview
-
Create a variety of multiplayer games and apps in the Unity 4 game engine,...
| | Java 2 Platform, Enterprise Edition: Platform and Component SpecificationsThe Java 2(TM) Platform, Enterprise Edition (J2EE) defines a new standard in enterprise solutions through a simplified, component-based development model. By extending the "write-once, run-anywhere(TM)" benefits of the Java programming language to enterprise servers, J2EE adds the scalability, robustness, and... |
|
| | iOS Programming: The Big Nerd Ranch Guide (2nd Edition) (Big Nerd Ranch Guides)
In this book, the world's leading Apple platform development trainers offer a complete, practical, hands-on introduction to iPhone and iPad programming. The authors walk through all the Apple tools and technologies needed to build successful iPhone/iPad/iPod touch apps, including the iOS 4.3 SDK, the Objective-C language, Xcode 4,... | | Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... |
|
ZeroMQ: Messaging for Many Applications
Dive into ØMq (aka ZeroMq), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system ... | | The Evolution of Violence (Evolutionary Psychology)
This volume is an interdisciplinary exploration of our understanding of the causes and consequences of violence. Represented in its chapters are noted scholars from a variety of fields including psychology, anthropology, law, and literature. The contributions reflect a broad scope of inquiry and diverse levels of analysis. With an underlying... | | Introducing Gradle
This concise book is a quick start-up primer on the Gradle build and release tool. You'll learn about Gradle and how to set it up to use. You'll learn about the Gradle life cycle and how to effectively leverage and use it. Also, you'll learn the basics of using site plugins and generating Javadocs, test coverage/FindBugs reports,... |
|
Multistate Systems Reliability Theory with Applications
Most books in reliability theory are dealing with a description of component and system states as binary: functioning or failed. However, many systems are composed of multi-state components with different performance levels and several failure modes. There is a great need in a series of applications to have a more refined description of these... | | Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat... | | Patterns of Enterprise Application ArchitectureThe practice of enterprise application development has benefited from the emergence of many new enabling technologies. Multi-tiered object-oriented platforms, such as Java and .NET, have become commonplace. These new tools and technologies are capable of building powerful applications, but they are not easily implemented.... |
|
|
Result Page: 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 |