Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Switchmode RF Power Amplifiers (Communications Engineering)
Switchmode RF Power Amplifiers (Communications Engineering)
A majority of people now have a digital mobile device whether it be a cell phone, laptop, or blackberry. Now that we have the mobility we want it to be more versatile and dependable; RF power amplifiers accomplish just that. These amplifiers take a small input and make it stronger and larger creating a wider area of use with a more robust...
Unlocking Android
Unlocking Android
Android is a free, open source, Java-based mobile platform developed by Google. Unlocking Android prepares the reader to embrace the Android mobile platform in easy-to-understand language and builds on this foundation with reusable Java code examples. It's ideal for corporate developers and hobbyists who have an interest, or a mandate, to...
Pro Android with Kotlin: Developing Modern Mobile Apps
Pro Android with Kotlin: Developing Modern Mobile Apps

Develop Android apps with Kotlin to create more elegant programs than the Java equivalent. This book covers the various aspects of a modern Android app that professionals are expected to encounter. There are chapters dealing with all the important aspects of the Android platform, including GUI design, file- and...

Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript
Hands-On Design Patterns with React Native: Proven techniques and patterns for efficient native mobile development with JavaScript

Learn how to write cross platform React Native code by using effective design patterns in the JavaScript world. Get to know industry standard patterns as well as situational patterns. Decouple your application with these set of “Idea patterns”.

Key Features

  • Mobile development...
The Mobile Application Hacker's Handbook
The Mobile Application Hacker's Handbook

See your app through a hacker's eyes to find the real sources of vulnerability

The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward...

Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python
Learn Robotics Programming: Build and control autonomous robots using Raspberry Pi 3 and Python

Gain experience of building a next-generation collaboration robot

Key Features

  • Get up and running with the fundamentals of robotic programming
  • Program a robot using Python and the Raspberry Pi 3
  • Learn to build a smart robot with interactive and AI-enabled...
Learn to Program, Second Edition (The Facets of Ruby Series)
Learn to Program, Second Edition (The Facets of Ruby Series)

Printed in full color.

For this new edition of the best-selling Learn to Program, Chris Pine has taken a good thing and made it even better. First, he used the feedback from hundreds of reader e-mails to update the content and make it even clearer. Second, he updated the examples in the book to use the latest
...

UX Fundamentals for Non-UX Professionals: User Experience Principles for Managers, Writers, Designers, and Developers
UX Fundamentals for Non-UX Professionals: User Experience Principles for Managers, Writers, Designers, and Developers
What can a WWII-era tank teach us about design? What does a small, blue flower tell us about audiences? What do drunk, French marathon-runners show us about software? In 40+ chapters and stories, you will learn the ways in which UX has influenced history and vice versa, and how it continues to change our daily lives. ...
CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

Algorithms Unlocked
Algorithms Unlocked

Have you ever wondered how your GPS can find the fastest way to your destination, selecting one route from seemingly countless possibilities in mere seconds? How your credit card account number is protected when you make a purchase over the Internet? The answer is algorithms. And how do these mathematical formulations translate themselves...

RF and Microwave Circuits, Measurements, and Modeling (The RF and Microwave Handbook, Second Edition)
RF and Microwave Circuits, Measurements, and Modeling (The RF and Microwave Handbook, Second Edition)

The first edition of the RF and Microwave Handbook was published in 2000. The project got off to an inauspicious start when 24 inches of snow fell in Denver the evening before the advisory board planned to hold their kick-off meeting. Two members of the board were trapped for days in the Denver airport since planes were not arriving or...

Result Page: 55 54 53 52 51 50 49 48 47 46 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy