Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Pro iOS 5 Tools: Xcode, Instruments and Build Tools (Professional Apress)
Pro iOS 5 Tools: Xcode, Instruments and Build Tools (Professional Apress)
By now, you have written an iOS application or two. You have also learned that making a great app is hard work. From spontaneous crashes to memory leaks and bugs that create other bugs, the simplest of apps can quickly become a nightmare. Fortunately, these issues are easy to diagnose with the tools at our disposal.

...
Flash Foresight: How to See the Invisible and Do the Impossible
Flash Foresight: How to See the Invisible and Do the Impossible

Flash Foresight offers seven radical principles you need to transform your business today. From internationally renowned technology forecaster Daniel Burrus—a leading consultant to Google, Proctor & Gamble, IBM, and many other Fortune 500 firms—with John David Mann, co-author of the Wall Street Journal...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Developing Flex 4 Components: Using ActionScript & MXML to Extend Flex and AIR Applications
Developing Flex 4 Components: Using ActionScript & MXML to Extend Flex and AIR Applications

The first book to completely demystify leading-edge component development with the Adobe Flex 3 platform - How to build components for Flex and AIR applications using ActionScript 3.0 and Adobe's powerful MXML user interface markup language - Covers expert techniques most books ignore, including component metadata, error handling,...

Visual C# Game Programming for Teens
Visual C# Game Programming for Teens

Imagine this scenario: You create a hunter character with random stats and hit points and enter the dungeon to begin exploring for treasure. You stumble upon a zombie pacing near a pile of gear and gold! You attack the zombie and it strikes back! You roll 1D20 and score a critical hit! The 20 point die plus dexterity, against the...

DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)

In early 2004, DTrace remained nascent; while Mike Shapiro, Adam Leventhal, and I had completed our initial implementation in late 2003, it still had substantial gaps (for example, we had not yet completed user-level instrumentation on x86), many missing providers, and many features yet to...

The Image Processing Handbook, Sixth Edition
The Image Processing Handbook, Sixth Edition

Image processing is used in a wide variety of applications, for two somewhat different purposes:

1. improving the visual appearance of images to a human observer, including their printing and transmission, and

2. preparing images for the measurement of the features and structures which they reveal.

The...

MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory
MCTS Self-Paced Training Kit (Exam 70-640): Configuring Windows Server 2008 Active Directory

This training kit is designed for IT professionals who support or plan to support Microsoft Active Directory (AD) on Windows Server 2008 R2 and who also plan to take the Microsoft Certified Technology Specialist (MCTS) 70-640 examination. It is assumed that you have a solid foundation-level understanding of Microsoft Windows...

Data Mining and Machine Learning in Cybersecurity
Data Mining and Machine Learning in Cybersecurity

In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a critical organizational and national research agenda inviting interest from a multidisciplinary scientific workforce. There are many avenues into this area, and, in recent research, machine-learning and data-mining techniques have been applied to design,...

Beginning BlackBerry 7 Development
Beginning BlackBerry 7 Development

Are you interested in creating BlackBerry apps using the latest BlackBerry 7 and BlackBerry Java Plug-in for Eclipse? Then this is the book for you. Beginning BlackBerry 7 Development offers a hands-on approach to learning how to build and deploy sophisticated BlackBerry apps using the latest tools...

Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Advances in Digital Forensics VII: 7th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA
Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now...
The Rough Guide to Dominican Republic
The Rough Guide to Dominican Republic

"The Rough Guide to the Dominican Republic" is the definitive guide to this beautiful and fascinating place, with clear maps and detailed coverage of all the best attractions. Discover the Dominican Republic's highlights with stunning photography and information on everything from the country's pine-forested mountain ranges...

Result Page: Previous 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy