Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning iOS Forensics
Learning iOS Forensics

A practical hands-on guide to acquire and analyze iOS devices with the latest forensic techniques and tools

About This Book

  • Perform logical, physical, and file system acquisition along with jailbreaking the device
  • Get acquainted with various case studies on different forensic toolkits...
Submarine Mass Movements and their Consequences: 7th International Symposium
Submarine Mass Movements and their Consequences: 7th International Symposium

This book is a comprehensive collection of state-of-the-art studies of seafloor slope instability and their societal implications. The volume captures the most recent and exciting scientific progress made in this research field.

As the world’s climate and energy needs change, the conditions under which slope instability...

Android Hardware Interfacing with the BeagleBone Black
Android Hardware Interfacing with the BeagleBone Black

Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black

About This Book

  • Design custom apps that interact with the outside world via BeagleBone Black
  • Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
Beginning Software Engineering
Beginning Software Engineering

A complete introduction to building robust and reliable software

Beginning Software Engineering demystifies the software engineering methodologies and techniques that professional developers use to design and build robust, efficient, and consistently reliable software. Free of jargon and assuming no previous
...

SFML Game Development by Example
SFML Game Development by Example

Create and develop exciting games from start to finish using SFML

About This Book

  • Familiarize yourself with the SFML library and explore additional game development techniques
  • Craft, shape, and improve your games with SFML and common game design elements
  • A practical guide...
Metonymy: Hidden Shortcuts in Language, Thought and Communication (Cambridge Studies in Cognitive Linguistics)
Metonymy: Hidden Shortcuts in Language, Thought and Communication (Cambridge Studies in Cognitive Linguistics)

'Metonymy' is a type of figurative language used in everyday conversation, a form of shorthand that allows us to use our shared knowledge to communicate with fewer words than we would otherwise need. 'I'll pencil you in' and 'let me give you a hand' are both examples of metonymic language. Metonymy serves a wide...

Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

Over 70 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto know-how

About This Book

  • Explore best practices for all embedded product development stages
  • Use what is quickly becoming the standard embedded Linux product builder framework, the Yocto...
Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Ruby Cookbook: Recipes for Object-Oriented Scripting
Ruby Cookbook: Recipes for Object-Oriented Scripting

Why spend time on coding problems that others have already solved when you could be making real progress on your Ruby project? This updated cookbook provides more than 350 recipes for solving common problems, on topics ranging from basic data structures, classes, and objects, to web development, distributed programming, and...

Risk-Pooling Essentials: Reducing Demand and Lead Time Uncertainty (SpringerBriefs in Business)
Risk-Pooling Essentials: Reducing Demand and Lead Time Uncertainty (SpringerBriefs in Business)

This book provides comprehensive and concise definitions of risk pooling and risk-pooling methods, a straightforward statistical explanation, and a value-chain oriented framework for analyzing risk-pooling methods. Risk pooling mitigates demand and lead time uncertainty in logistics and supply chain...

Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
The Concise Encyclopedia of Communication
The Concise Encyclopedia of Communication

This concise volume presents key concepts and entries from the twelve-volume ICA International Encyclopedia of Communication (2008), condensing leading scholarship into a practical and valuable single volume.

  • Based on the definitive twelve-volume IEC, this new concise edition presents key concepts and the most...
Result Page: Previous 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy