Home | Amazing | Today | Tags | Publishers | Years | Search 
Windows 8 for Tablets Plain & Simple
Windows 8 for Tablets Plain & Simple

This book is for people who have a Windows 8–based tablet and aren’t quite sure how to do everything with it. Windows 8 makes your tablet very intuitive and very easy to use with touch, but you’ll want a guide to help you get the most from it; that’s why you have this book in your hand. Sure, you’ll want...

Beginning Windows 8 Application Development (Wrox Programmer to Programmer)
Beginning Windows 8 Application Development (Wrox Programmer to Programmer)

DURING ITS 27 YEARS OF LIFE, Windows has undergone several big changes. Without a doubt, both users and developers perceive a big leap from Windows 7 to Windows 8! When Microsoft began development of the newest Windows version, it totally re-imagined the operating system. Instead of patching the previous versions and just adding new or...

Windows 8 Plain & Simple
Windows 8 Plain & Simple

Knowing how to use your Windows operating system features is key to a successful computing experience. With Windows 8, even those who have used Windows for years will find that they have quite a few new features and interface changes to get used to. This book is designed to give you a simple-touse visual reference that has you using...

Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)
Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)

Ruby on Rails™ Tutorial by Michael Hartl has become a must-read for developers learning how to build Rails apps.”

Peter Cooper, Editor of Ruby Inside

 

Using Rails, developers can build...

Ethical Hacking and Countermeasures: Web Applications and Data Servers
Ethical Hacking and Countermeasures: Web Applications and Data Servers
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Blender Game Engine: Beginner's Guide
Blender Game Engine: Beginner's Guide

Blender Game Engine is the part of the Blender 3D editor used to create actual 3D video games. It's the ideal entry level game development environment because you don't even need to learn to program. Create a complete game using Bender's innovative logic bricks.

"Blender Game Engine: Beginner's Guide" is...

Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Ethical Hacking and Countermeasures: Threats and Defense Mechanisms (EC-Council Certified Ethical Hacker (Ceh))
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Computer Forensics: Investigation Procedures and Response (Ec-Council Press Series : Computer Series)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
Harnessing Green IT: Principles and Practices (Wiley - IEEE)
Harnessing Green IT: Principles and Practices (Wiley - IEEE)

“Ultimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT journey are any indication, this book will be used every day by folks interested in...

Handbook of Software Engineering and Knowledge Engineering, Vol 2 Emerging Technologies
Handbook of Software Engineering and Knowledge Engineering, Vol 2 Emerging Technologies
The Handbook of Software Engineering and Knowledge Engineering is the first comprehensive handbook covering these two important areas that have become interwoven in recent years. Many international experts contribute to this Handbook. Each article is written in a way that a practitioner of software engineering and knowledge...
Fundamental Approach to Discrete Mathematics
Fundamental Approach to Discrete Mathematics

The salient features of this book include: strong coverage of key topics involving recurrence relation, combinatorics, Boolean algebra, graph theory and fuzzy set theory. Algorithms and examples integrated throughout the book to bring clarity to the fundamental concepts. Each concept and definition is followed by thoughtful examples. There is...

Result Page: 394 393 392 391 390 389 388 387 386 385 384 383 382 381 380 379 378 377 376 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy