Android Design Patterns: Interaction Design Solutions for Developers
Master the challenges of Android user interface development with these sample patterns
With Android 4, Google brings the full power of its Android OS to both smartphone and tablet computing. Designing effective user interfaces that work on multiple Android devices is extremely challenging. This book provides more than 75...
Netduino Home Automation Projects
With this book you could have the home of tomorrow, literally tomorrow. Its totally practical approach is perfect for the hobbyist who wants to use Netduino to automate their home. Full of fun projects and clear instructions.
Automate your house using a Netduino and a bunch of common...
Mobile Design Pattern Gallery: UI Patterns for Smartphone Apps
When you’re under pressure to produce a well-designed, easy-to-navigate mobile app, there’s no time to reinvent the wheel—and no need to. This handy reference provides more than 90 mobile app design patterns, illustrated by 1,000 screenshots from current Android, iOS, and Windows Phone apps.
Android Hacker's Handbook
The first comprehensive guide to discovering and preventing attacks on the Android OS
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book...
Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman...
|Result Page: 14 13 12 11 10 9 8 7 6 5 |