 |
|
|
|
 Cyber Security Essentials
The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and... |  |  jQuery Mobile
Mobile applications come in two basic flavors: native applications, which are compiled
programs that run natively on the device, and mobile web applications, which run
inside a web browser on the device.
Native applications get almost all of the press these days, especially given the financial
success of the iTunes App Store... |  |  Basic Sensors in iOS: Programming the Accelerometer, Gyroscope, and More
Over the last few years the new generation of smart phones, such as Apple’s iPhone,
has finally started to live up to their name and have become the primary interface device
for geographically tagged data. However not only do these devices know where they
are, they can tell you how they’re being held, they are... |
|
|
Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 |