Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
Signal Processing, Perceptual Coding and Watermarking of Digital Audio: Advanced Technologies and Models (Premier Reference Source)
The availability of increased computational power and the proliferation of the Internet have facilitated the production and distribution of unauthorized copies of multimedia information. As a result, the problem of copyright protection has attracted the interest of the worldwide scientific and business communities. The most...
Expert F# 3.0
Expert F# 3.0

Expert F# 3.0 is about practical programming in a beautiful language that puts the power and elegance of data-rich functional programming into the hands of professional developers. In combination with .NET, F# achieves unrivaled levels of programmer productivity and program clarity.

Expert F# 3.0 is:

...
Learning Metasploit Exploitation and Development
Learning Metasploit Exploitation and Development

Metasploit is an open source exploit framework that provides you with heaps of exploits, as well as tools to assist you in creating your own exploits. This includes the ability to generate a large range of shellcodes for different purposes and platforms that can be customized to attack your target. The recent improvements in network security...

Pro SharePoint 2013 Branding and Responsive Web Development (The Expert's Voice)
Pro SharePoint 2013 Branding and Responsive Web Development (The Expert's Voice)

Pro SharePoint 2013 Branding and Responsive Web Development is the definitive reference on the technologies, tools, and techniques needed for building responsive websites and applications with SharePoint 2013.  The book focuses on solutions that provide the best browser experience for the myriad of devices,...

FuelPHP Application Development Blueprints
FuelPHP Application Development Blueprints

Supercharge your projects by designing and implementing web applications with FuelPHP

About This Book

  • Construct top-notch web applications with one of the best frameworks based on PHP
  • Implement new functionalities using FuelPHP's convenient utilities and features such as the ORM,...
jQuery Mobile Web Development Essentials, Second Edition
jQuery Mobile Web Development Essentials, Second Edition

Mobile friendly websites are easy with jQuery because it works with HTML, and this superb tutorial makes it simpler still. From structuring your sites for mobile devices to creating native applications, this book has it all.

Overview

  • Create websites that work beautifully on a wide range of mobile...
Practical Node.js: Building Real-World Scalable Web Apps
Practical Node.js: Building Real-World Scalable Web Apps

Learn how to build a wide range of scalable real-world web applications using a professional development toolkit. If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages.With this book, you'll work with a varied collection of standards...

Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition
Mastering Embedded Linux Programming: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell), 3rd Edition

Harness the power of Linux to create versatile and robust embedded solutions

Key Features

  • Learn how to develop and configure robust embedded Linux devices
  • Explore the new features of Linux 5.4 and the Yocto Project 3.1 (Dunfell)
  • Discover different ways to...
Beginning PHP5 (Programmer to Programmer)
Beginning PHP5 (Programmer to Programmer)

PHP5 is the newest version of the preferred language for rapidly creating dynamic Web page content. While its main use is as a cross-platform, HTML-embedded, server-side Web scripting language, it now works equally well when creating multi-tiered applications or XML-based applications as well as Web applications. This book teaches you the...

Black Hat Physical Device Security: Exploiting Hardware and Software
Black Hat Physical Device Security: Exploiting Hardware and Software
Attacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,...
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software
Design for Trustworthy Software: Tools, Techniques, and Methodology of Developing Robust Software

An Integrated Technology for Delivering Better Software—Cheaper and Faster!

 

This book presents an integrated technology, Design for Trustworthy Software (DFTS), to address software quality issues upstream such that the goal of software...

Use Cases: Requirements in Context, Second Edition
Use Cases: Requirements in Context, Second Edition

This book describes how to gather and define software requirements using a process based on use cases. It shows systems analysts and designers how use cases can provide solutions to the most challenging requirements issues, resulting in effective, quality systems that meet the needs of users.

Use Cases, Second Edition:...

unlimited object storage image
Result Page: 273 272 271 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy