Building and Testing with Gradle
This book has a very clear aim: introduce you to the incredible simplicity and power
Gradle is a flexible yet model-driven JVM-based build tool. Gradle acknowledges and
improves on the very best ideas from Make, Ant, Ivy, Maven, Rake, Gant, Scons, SBT,
Leinengen, and Buildr. The best-of-breed features previously...
Silverlight 4 User Interface Cookbook
Silverlight makes it much easier to build web applications with highly usable, interactive, and exciting user interfaces. However, with so many new options open to designers and developers, making the best use of the tools available is not always so easy. It's ease of use and rapid development process has left one area completely...
Raspberry Pi Cookbook for Python Programmers
Over 50 easy-to-comprehend tailor-made recipes to get the most out of the Raspberry Pi and unleash its huge potential using Python
Install your first operating system, share files over the network, and run programs remotely
Unleash the hidden potential of the Raspberry Pi's...
Professional Windows Live Programming (Programmer to Programmer) Professional Windows Live Programming
This step-by-step guide demystifies the next generation of Microsoft web programming—Windows Live. An exciting new set of tools and features, Windows Live can change the way you design, build, and market web sites. Experienced author Jon Arking presents you with a comprehensive...
Lightroom 5: Streamlining Your Digital Photography Process
Manage your images with Lightroom and this beautifully illustrated guide
Image management can soak up huge amounts of a photographer's time, but help is on hand. This complete guides teaches you how to use Adobe Lightroom 5 to import, manage, edit, and showcase large quantities of images with impressive results. The...
Snort Cookbook If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an...
|Result Page: 9 8 7 6 5 4 3 2 1 |