|
|
|
|
Rapid BeagleBoard Prototyping with MATLAB and Simulink
Leverage the power of BeagleBoard to develop and deploy practical embedded projects
Overview
-
Develop and validate your own embedded audio/video applications rapidly with Beagleboard
-
Create embedded Linux applications on a pure Windows PC
-
Full of illustrations, diagrams, and...
| | WebRTC Blueprints
Develop your very own media applications and services using WebRTC
Overview
-
Create interactive web applications using WebRTC
-
Get introduced to advanced technologies such as WebSocket and Erlang
-
Develop your own secure web applications and services with practical projects
... | | Teaching with iPad How-to
Use your iPad creatively for everyday teaching tasks in schools and universities
Overview
-
Plan your lessons on iPad and share notes quickly
-
Use exclusive iPad 3D resources for more engaging learning.
-
Use your iPad for creating and giving presentations.
... |
|
jQuery Tools UI Library
"Let's face it—do you really need drag and drop, resizable windows, or sortable lists on your website…?"
If the answer is no, then welcome to "jQuery Tools UI Library"!
jQuery Tools is a compact, powerful library that contains enough components to provide the most ... | | | | Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
-
Write your own custom information security tools using Perl and object-oriented Perl modules
-
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
- ...
|
|
Learning OMNeT++
Make realistic and insightful network simulations with OMNeT++
Overview
-
Create a virtual Network Simulation Environment rapidly
-
Focus less on the theory and more on results, with clear, step-by-step instructions, previews, and examples to help you along the way
-
Learn how to...
| | Mastering Modern Web Penetration Testing
Key Features
-
This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
-
Penetrate and secure your web application using various techniques
-
Get this comprehensive
... | | |
|
|
|
Result Page: 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 202 201 200 |