Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro Android Games
Pro Android Games

In the last few years, Android has progressed with the debut of better fonts, new User Interface and Experience (UI/UX) APIs, tablet considerations, multi-touch capabilities, multi-tasking, faster performance, improved battery management techniques, and now Google TV Android Apps for the Android game...

Using Yocto Project with BeagleBone Black
Using Yocto Project with BeagleBone Black

Unleash the power of the BeagleBone Black embedded platform with Yocto Project

About This Book

  • Build real world embedded system projects using the impressive combination of Yocto Project and Beaglebone Black
  • Learn how to effectively add multimedia to your board and save time by exploiting...
Mastering IOS Game Development
Mastering IOS Game Development

Master the advanced concepts of game development for iOS to build impressive games

About This Book

  • Create a complete game with advanced techniques through the course of the book using in-depth, hands-on instructions
  • Learn how to multi-task and improve performance optimization in your game...
USB Design by Example: A Practical Guide to Building I/O Devices
USB Design by Example: A Practical Guide to Building I/O Devices
The Universal Serial Bus (USB) specification is a boon for users in that it makes the process of connecting peripherals to computers effortless, in most cases. As is often the case with user-friendliness, though, the cosmetic ease comes about as a result of behind-the-scenes complexity. USB Design by Example explains what USB means to...
Building a Home Security System with Raspberry Pi
Building a Home Security System with Raspberry Pi

Build your own sophisticated modular home security system using the popular Raspberry Pi board

About This Book

  • This book guides you through building a complete home security system with Raspberry Pi and helps you remotely access it from a mobile device over the Internet
  • It covers the...
Raspberry Pi Projects
Raspberry Pi Projects

Learn to build software and hardware projects featuring the Raspberry Pi!

Raspberry Pi represents a new generation of computers that encourages the user to play and to learn and this unique book is aimed at the beginner Raspberry Pi user who is eager to get started creating real-world projects. Taking you on a journey of...

Anti-Hacker Tool Kit, Fourth Edition
Anti-Hacker Tool Kit, Fourth Edition

Defend against today's most devious attacks

Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best...

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)
Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits (Uncovered series)

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping...

Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud
Cloud Native Architectures: Design high-availability and cost-effective applications for the cloud

Learn and understand the need to architect cloud applications and migrate your business to cloud efficiently

Key Features

  • Understand the core design elements required to build scalable systems
  • Plan resources and technology stacks effectively for high security and fault...
Debugging Linux Systems
Debugging Linux Systems

Debugging Linux Systems discusses the main tools available today to debug 2.6 Linux Kernels. We start by exploring the seemingly esoteric operations of the Kernel Debugger (KDB), Kernel GNU DeBugger (KGDB), the plain GNU DeBugger (GDB), and JTAG debuggers. We then investigate Kernel Probes, a feature that lets you intrude into a kernel...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy