Gangsterismo: The United States, Cuba and the Mafia, 1933 to 1966
"The anti-communist hysteria generated by the Cold War frequently unhinged the policy judgments of US government officials in many areas, but nowhere so completely as in our relations with Cuba. This conclusion is inescapable as Gangsterismo brilliantly unravels the bizarre tale of the Mafia army the Kennedy brothers recruited in their...
Cinder Creative Coding Cookbook
If you know C++ this book takes your creative potential to a whole other level. The practical recipes show you how to create interactive and visually dynamic applications using Cinder which will excite and delight your audience.
Learn powerful techniques for building creative applications using...
Realm of Racket: Learn to Program, One Game at a Time!
Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language.
In Realm of...
ASP.NET MVC 4 and the Web API: Building a REST Service from Start to Finish
Instant Node.js Starter
Program your scalable network applications and web services with Node.js with this book and ebook
Learn something new in an Instant! A short, fast, focused guide delivering immediate results
Learn how to use module patterns and Node Packet Manager (NPM) in your applications...
Battery Systems Engineering
A complete all-in-one reference on the important interdisciplinary topic of Battery Systems Engineering
Focusing on the interdisciplinary area of battery systems engineering, this book provides the background, models, solution techniques, and systems theory that are necessary for the development of advanced battery management...
Dynamic Secrets in Communication Security
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...
Android Application Security Essentials
Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.
Understand Android security from kernel to the application layer
Microsoft .Net Framework 4.5 Quickstart Cookbook
With about 10 years since its first release, Microsoft's .NET Framework 4.5 is one of the most solid development technologies for creating casual, business, or enterprise applications. It has evolved into a very stable and solid framework for developing applications, with a solid core called the CLR (Common Language Runtime)....
|Result Page: Previous 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 Next |