 |
|
|
|
 Mastering Blender
New edition shows you how to get the very most out of the latest version of Blender
Blender, the open-source 3D software, is more popular than ever and continues to add functionality. If you're an intermediate or advanced user, this new edition of Tony Mullen's expert guide is what you need to get up to speed on... |  |  Android Recipes: A Problem-Solution Approach
Android continues to be one of the leading mobile OS and development platforms driving today's mobile innovations and the apps ecosystem. Android appears complex, but offers a variety of organized development kits to those coming into Android with differing programming language skill sets.
Android Recipes: A... |  |  The Definitive Guide to Grails 2
Grails is a full stack framework which aims to greatly simplify the task of building serious web applications for the JVM. The concepts within Grails, like interceptors, tag libs, and Groovy Server Pages (GSP), make those in the Java community feel right at home.
Grails’ foundation is on solid open source technologies such as... |
|
 Group Policy: Fundamentals, Security, and the Managed Desktop
The Ultimate Book on Group Policy
Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft... |  |  Making Use of PHP
PHP has an edge over locked-in solutions such as JSP and ASP for most Web development work because it is a cross-platform technology. Surveys indicate that PHP is rapidly becoming the most widely used Web scripting language and PHP skills are now considered essential for many Web developers.
* Explains why PHP is easier to learn... |  |  Hacking Web Apps: Detecting and Preventing Web Application Security Problems
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these... |
|
| Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 |