Building Mobile Apps at Scale: 39 Engineering Challenges
While there is a lot of appreciation for backend and distributed systems challenges, there tends to be less empathy for why mobile development is hard when done at scale.
This book collects challenges engineers face when building iOS and Android apps at scale, and common ways to tackle these
. By scale, we mean having...
Programming MapPoint in .NET
Interactive web maps generated by MapPoint-Microsoft's popular mapping technology are crucial for businesses in a number of fields, including real estate, package delivery, and commercial air travel. In a word, MapPoint provides businesses with "location." Specifically, it provides an integrated set of products,...
Google Hacks: Tips & Tools for Finding and Using the World's Information
Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.
Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding...
Hacking Raspberry Pi
DIY hardware hacking...easy as Pi ®!
Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful...
Windows 10 All-In-One For Dummies
The most comprehensive guide to Windows 10, updated with the latest enhancements
If you're new to Windows 10 and want an authoritative and accessible guide to the basics of the widely used operating system, Windows 10 All-in-One For Dummies is the book for you. Written by trusted Windows expert Woody Leonhard,...
Net Locality: Why Location Matters in a Networked World
A man is walking down Michigan Avenue in Chicago. He shares a sidewalk
with crowds of anonymous people. He sees skyscrapers and signage
extending to the horizon. There is a lot going on – people talking, walking,
playing, fighting, screaming, driving, and smiling. He sees a coffee shop
that excites his interest. He pulls... Hiding in Plain Sight: Steganography and the Art of Covert Communication Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography
These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...
|Result Page: 40 39 38 37 36 35 34 33 32 31 |