Head First Python
Ever wished you could learn Python from a book? Head First Python is a complete learning experience for Python that helps you learn the language through a unique method that goes beyond syntax and how-to manuals, helping you understand how to be a great Python programmer. You'll quickly learn the language's...
Essential SQLAlchemy: Mapping Python to Databases
Dive into SQLAlchemy, the popular, open-source code library that helps Python programmers work with relational databases such as Oracle, MySQL, PostgresSQL, and SQLite. Using real-world examples, this practical guide shows you how to build a simple database application with SQLAlchemy, and how to connect to multiple databases...
Mastering Object-oriented Python
For those who know the basics of object-oriented Python this book is a must-have. With 750 code samples and a relaxed tutorial approach, it’s the seamless route to more sophisticated programming.
Create applications with flexible logging, powerful configuration and command-line options,...
Getting Started with ownCloud
Making your data easily accessible on multiple devices is the primary goal of ownCloud. It gives you control of your own data along with the flexibility to set it up the way you want it. Community backup to the project ensures high quality software and gives you the power to modify and create features.
Getting Started with ownCloud...
Android Programming for Beginners
Learn all the Java and Android skills you need to start making powerful mobile applications
About This Book
Kick-start your Android programming career, or just have fun publishing apps to the Google Play marketplace
A first-principles introduction to Java, via Android, which means...
Learning Pentesting for Android Devices
Android is the most popular mobile smartphone operating system at present, with over a million applications. Every day hundreds of applications are published to the PlayStore, which users from all over the world download and use. Often, these applications have serious security weaknesses in them, which could lead an attacker to exploit the...
|Result Page: 7 6 5 4 3 2 1 |