Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Pentesting for Android Devices
Learning Pentesting for Android Devices

Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...

Creating Dynamic UI with Android Fragments - Second Edition
Creating Dynamic UI with Android Fragments - Second Edition

Create engaging apps with fragments to provide a rich user interface that dynamically adapts to the individual characteristics of your customers' tablets and smartphones

About This Book

  • From an eminent author comes a book that will help you create engaging apps that dynamically adapt to individual...
A Practical Guide to Testing Wireless Smartphone Applications (Synthesis Lectures on Mobile and Pervasive Computing)
A Practical Guide to Testing Wireless Smartphone Applications (Synthesis Lectures on Mobile and Pervasive Computing)
Testing applications for mobile phones is difficult, time-consuming, and hard to do effectively. Many people have limited their testing efforts to hands-on testing of an application on a few physical handsets, and they have to repeat the process every time a new version of the software is ready to test. They may miss many of the permutations of...
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies
Firewalls Don’t Stop Dragons: A Step-by-Step Guide to Computer Security for Non-Techies

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself?step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know....

Radiology Illustrated: Chest Radiology
Radiology Illustrated: Chest Radiology
Multidetector CT images of the state-of-the-art quality are increasingly produced in thoracic imaging, and in the near future, the CT imaging is expected to substitute chest radiography especially in outpatient clinic and may be ordered as a routine admission battery examination.

In MEDLINE or other search engines,
...
Learn Android App Development
Learn Android App Development

Learn Android App Development is a hands-on tutorial and useful reference. You'll quickly get up to speed and master the Android SDK and the Java that you need for your Android Apps.

The Android SDK offers powerful features, and this book is the fastest path to mastering them—and the rest of the Andorid...

Android Phones For Dummies
Android Phones For Dummies

This title contains everything you need to know about your Android smartphone in full color. Eager to learn the ins and outs of your exciting, new Android phone? Then this is the book you need! Written in the typical fun and friendly "For Dummies" style, this full-color guide covers the basics of all the features of Android phones...

Android Fully Loaded
Android Fully Loaded

Adobe MAX is a conference sponsored by Adobe every year to bring together developers and designers who work with Adobe technologies and enable them to learn new techniques, network with one another, and, in general, get excited about the company and its products. Of course, the attendees of a conference like MAX are almost by...

OpenCV for Secret Agents
OpenCV for Secret Agents

Use OpenCV in six secret projects to augment your home, car, phone, eyesight, and any photo or drawing

About This Book

  • Build OpenCV apps for the desktop, the Raspberry Pi, Android, and the Unity game engine
  • Learn real-time techniques that can be used to classify images, detecting and...
Penetration Testing: A Hands-On Introduction to Hacking
Penetration Testing: A Hands-On Introduction to Hacking

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.

In Penetration Testing, security expert, researcher, and trainer Georgia Weidman
...

Location-Based Gaming: Play in Public Space
Location-Based Gaming: Play in Public Space
Location-based games emerged in the early 2000s following the commercialisation of GPS and artistic experimentation with ‘locative media’ technologies. Location-based games are played in everyday public spaces using GPS and networked, mobile technologies to track their players’ location. This book traces the...
iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their Limits
iPhone Hacks: Pushing the iPhone and iPod touch Beyond Their Limits
With iPhone Hacks, you can make your iPhone do all you'd expect of a mobile smartphone -- and more. Learn tips and techniques to unleash little-known features, find and create innovative applications for both the iPhone and iPod touch, and unshackle these devices to run everything from network utilities to video game emulators.
...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy