Home | Amazing | Today | Tags | Publishers | Years | Search 
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
Advancements in Distributed Computing and Internet Technologies: Trends and Issues
The concept of the Internet has been a tremendous success by this time. Other than being a great source of fun and enjoyment, millions of people around the world rely on the Internet for various tasks related to their livelihoods. The overwhelming growth of the Internet and its users is now a reality, which has put new thoughts...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
Internet Marketing with WordPress
Internet Marketing with WordPress
It's very difficult to overstate the importance of Internet marketing.

With the advent of powerful and effective tools (like WordPress) that make it easy for anyone in the world to put up a website, it is now more important than ever to carve out a niche for yourself.

The online world requires its
...
APIs: A Strategy Guide
APIs: A Strategy Guide
APIs are a big deal and they are getting bigger. Pioneering companies such as Google, Facebook, Apple, and Twitter have exposed amazing technological solutions to the public, transforming existing businesses and creating new industries. Central to these companies’ successes are the APIs that link people and...
The Complete IS-IS Routing Protocol
The Complete IS-IS Routing Protocol
IS-IS has always been my favourite Interior Gateway Protocol. Its elegant simplicity, its well-structured data formats, its flexibility and easy extensibility are all appealing – IS-IS epitomizes link-state routing. Whether for this reason or others, IS-IS is the IGP of choice in some of the world’s largest networks....
Adobe Flash 11 Stage3D (Molehill) Game Programming Beginner's Guide
Adobe Flash 11 Stage3D (Molehill) Game Programming Beginner's Guide
Adobe's Stage3D (previously codenamed Molehill) is a set of 3D APIs that has brought 3D to the Flash platform. Being a completely new technology, there were almost no resources to get you acquainted with this revolutionary platform, until now.

This book will show you how to make your very own next-gen 3D games in Flash. If
...
PSP Game Creation for Teens
PSP Game Creation for Teens
Games have come a long way since their inception far in our past. The tools we have used in our game play have changed, as well, from knuckle bones to cards to board games to early arcade games to today’s spiffy video game consoles. The progression has been a lengthy one. Now hardware advances are even changing the way we...
Pro .NET Best Practices
Pro .NET Best Practices

Pro .NET Best Practices is a practical reference to the best practices that you can apply to your .NET projects today. You will learn standards, techniques, and conventions that are sharply focused, realistic and helpful for achieving results, steering clear of unproven, idealistic, and impractical...

Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
The Android mobile platform has quickly risen from its first phone in October 2008 to the most popular mobile operating system in the world by early 2011. The explosive growth of the platform has been a significant win for consumers with respect to competition and features. However, forensic analysts and security engineers have...
Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Hello! Python
Hello! Python
When I was first asked to write Hello! Python, I didn’t want to write just another introductory book—I wanted to write something different. The programming books that I’ve read in the past have often been just a laundry list of features: a list can have things in it, and you can call len(mylist) to find out exactly how...
OSGi in Depth
OSGi in Depth
I started working with OSGi in about 2006. This was back in the days of BEA and Web- Logic. Our goal was a very ambitious one: to create a new application server profiled for a particular vertical market—financial front offices.
 
The journey has been a long one. But as they say, it is not just about...
Result Page: 444 443 442 441 440 439 438 437 436 435 434 433 432 431 430 429 428 427 426 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy