Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CMake Cookbook: Building, testing, and packaging modular software with modern CMake
CMake Cookbook: Building, testing, and packaging modular software with modern CMake

Learn CMake through a series of task-based recipes that provide practical, simple, and ready-to-use CMake solutions for your code

Key Features

  • Configure, build, and package software written in C, C++, and Fortran
  • Progress from simple to advanced tasks with examples tested...
Embedded Linux Primer: A Practical Real-World Approach
Embedded Linux Primer: A Practical Real-World Approach

Comprehensive Real-World Guidance for Every Embedded Developer and Engineer

This book brings together indispensable knowledge for building efficient, high-value, Linux-based embedded products: information that has never been assembled in one place before. Drawing on years of experience as an...

The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition
The Definitive Guide to ARM® Cortex®-M3 and Cortex®-M4 Processors, Third Edition

This new edition has been fully revised and updated to include extensive information on the ARM Cortex-M4 processor, providing a complete up-to-date guide to both Cortex-M3 and Cortex-M4 processors, and which enables migration from various processor architectures to the exciting world of the Cortex-M3 and M4.

This book presents the...

MySQL to DB2 Conversion Guide
MySQL to DB2 Conversion Guide

Switching database vendors is often considered an exhausting challenge for database administrators and developers. Complexity, total cost, and the risk of downtime are often the reasons that restrain IT decision makers from starting the migration project. The primary goal of this book is to show that, with the proper planning and...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Parallel Programming with Intel Parallel Studio XE (Wrox Programmer to Programmer)
Parallel Programming with Intel Parallel Studio XE (Wrox Programmer to Programmer)

Nearly all the computers sold today have a multi-core processor, but only a small number of applications are written to take advantage of the extra cores. Most programmers are playing catch-up. A recent consultation with a group of senior programming engineers revealed the top three hurdles in adopting parallelism: the challenges of porting...

Black Art of Java Game Programming
Black Art of Java Game Programming
Gaming on the Web is the next blockbuster business. Have any doubts? The video game industry,
which already eclipses Hollywood in terms of revenue, targets the Web as the next huge growth area.
Software developers are busily porting games to the online environment, or developing entirely new
ones. And numerous popular Web sites, many
...
Migrating to Swift from Android
Migrating to Swift from Android

In 2000, I started my first PalmOS mobile app for an inventory-tracking project. The initial project was a full-staffed team effort that consisted of mobile developers, SAP consultants, supply-chain subject matter experts, middleware developers, QA testers, architects, business sponsors, and so forth. JavaME came up strong in 2002, followed...

Linux on the Mainframe
Linux on the Mainframe

Linux on the Mainframe is the comprehensive guide to the fastest growing trend in IT. IBM's Linux experts present peerless instruction in the art of planning for and making the most of a Linux mainframe. This book's in-depth coverage includes virtualization, deployment, data management,...

Linux Applications on Pseries
Linux Applications on Pseries
The strengths of the AIX operating system are well known among in the UNIX software community. Its reliability and great degree of scaling make AIX the perfect choice for hosting mission-critical applications. It is a robust and flexible operating system that meets all the requirements for the various demands of e-business environments. At the same...
Learn BlackBerry 10 App Development: A Cascades-Driven Approach
Learn BlackBerry 10 App Development: A Cascades-Driven Approach

Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app’s UI, and C++/Qt for the application...

Embedded Android: Porting, Extending, and Customizing
Embedded Android: Porting, Extending, and Customizing

Looking to port Android to other platforms such as embedded devices? This hands-on book shows you how Android works and how you can adapt it to fit your needs. You’ll delve into Android’s architecture and learn how to navigate its source code, modify its various components, and create your own version of Android for your...

Result Page: 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy