Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Tkinter GUI Application Development Blueprints - Second Edition: Build nine projects by working with widgets, geometry management, event handling, and more
Tkinter GUI Application Development Blueprints - Second Edition: Build nine projects by working with widgets, geometry management, event handling, and more

Geometry Management, Event Handling, and more

Key Features

  • A Practical, guide to learn the application of Python and GUI programming with tkinter
  • Create multiple cross-platform real-world projects by integrating host of third party libraries and tools
  • ...
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Snort Cookbook
Snort Cookbook
If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
Microsoft Windows security inside out for Windows XP and Windows 2000
Microsoft Windows security inside out for Windows XP and Windows 2000
Hey, you know your way around a desktop-so now dig into the Windows operating system and really put its security features to work! Covering Windows XP Professional, Windows XP Home Edition, and Windows 2000 Professional, this supremely organized reference packs hundreds of timesaving solutions, checklists, troubleshooting tips, and workarounds-all...
Circuit Systems with MATLAB and PSpice
Circuit Systems with MATLAB and PSpice
Software tools applied to circuit analysis and design are rapidly evolving, enabling students to move beyond the time-consuming, math-intensive methods of traditional circuit instruction. By incorporating MATLAB 7.0 and PSpice 10.0, alongside systematic use of the Laplace transform, Yang and Lee help readers rapidly gain an intuitive...
ARM® Cortex® M4 Cookbook
ARM® Cortex® M4 Cookbook

About This Book

  • This book focuses on programming embedded systems using a practical approach
  • Examples show how to use bitmapped graphics and manipulate digital audio to produce amazing games and other multimedia applications
  • The recipes in this book are written using ARM's MDK...
IBM DB2 9.7 Advanced Application Developer Cookbook
IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement. In this cookbook, you can find both: hands-on and real world practical application development examples, as well...
Serosal Membranes (Pleura, Pericardium, Peritoneum): Normal Structure, Development and Experimental Pathology (Advances in Anatomy, Embryology and Cell Biology)
Serosal Membranes (Pleura, Pericardium, Peritoneum): Normal Structure, Development and Experimental Pathology (Advances in Anatomy, Embryology and Cell Biology)

in the human visceral pleura is the sole reliable criterion for the statement that it belongs to the ‘thick type’, while all observed animals have a ‘thin’ type VP. The mesothelium and underlying structures of the SM represent a highly permeable bidirectional membrane with signi?cant differences in the organ and region...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)
Flash Mobile: Developing Android and iOS Applications (Visualizing the Web)

Change: It’s what we expect from technology, from the PC to the web, through to HD TV. But nothing has been as disruptive as the change the iPhone and Android phones have brought. For the first time the power of a computer will fit in your hand, you are always connected to the Internet, and these devices are loaded with...

Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

Pro Java 7 NIO.2 (Professional Apress)
Pro Java 7 NIO.2 (Professional Apress)

The recommended entry point to start exploring the NIO.2 API, also known as “JSR 203: More New I/O

APIs for the Java Platform” (NIO.2), is the new abstract class java.nio.file.Path. This class is a milestone of NIO.2, and every application that involves I/O operations will exploit the powerful facilities of this
...
Result Page: 19 18 17 16 15 14 13 12 11 10 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy