|
|
|
|
Video Games (Technology 360)The past few decades have seen some amazing advances in technology. Many of these changes have had a direct and measureable impact on the way people live, work, and play. Communication tools, such as cell phones, satellites, and the Internet, allow people to keep in constantcontact across longer distances and from the most remote places.... | | Python and AWS Cookbook
If you intend to use Amazon Web Services (AWS) for remote computing and storage, Python is an ideal programming language for developing applications and controlling your cloud-based infrastructure. This cookbook gets you started with more than two dozen recipes for using Python with AWS, based on the author’s boto library. ... | | It Tolls For Thee: A guide to celebrating and reclaiming the end of life
A funeral celebrant's story about how celebrating death, and creating personalised space for grief, can enrich lives and give meaning to death.
After a close encounter with death, Tom Morton realised he needed a change of pace and perspective. He decided to become the only independent funeral celebrant on the ... |
|
|
Getting Started with HTML5 WebSocket Programming
Develop and deploy your first secure and scalable real-time web application
Overview
-
Start real-time communication in your web applications
-
Create a feature-rich WebSocket chat application
-
Learn the step-by-step configuration of the server and clients
... | | Top-Down Network Design Second Editionop-Down Network Design, Second Edition, is a practical and comprehensive guide to designing enterprise networks that are reliable, secure, and manageable. Using illustrations and real-world examples, it teaches a systematic method for network design that can be applied to campus LANs, remote-access networks, WAN... | | Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... |
|
|
|
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 |