Born to Kill | Next → | Stargate Atlantis
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Engineering Innovative Products: A Practical Experience
Engineering Innovative Products: A Practical Experience

"The book provides vital insights into commercial development for engineering students in a highly practical and applied manner. Over the past 3 years, application of the book’s material has allowed the students to develop their commercial literacy and ambition in the University."
Steve Orr, Director,
...

Event-Driven Programming
Event-Driven Programming
The previous unit, Unit 6, has shown you how to create graphical user interfaces that contain a wide range of components and have quite sophisticated layouts. You are also in a position now to make use of Java reference material to investigate and use other components and layouts. However, when the user clicks on a button or enters text, nothing...
Intermediate Security Testing with Kali Linux 2
Intermediate Security Testing with Kali Linux 2

With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defending their networks. But in the sea of training material it is hard to find effectual training using the latest tools and techniques. In “Intermediate Security Testing with Kali Linux...

Building Modern Web Applications Using Angular
Building Modern Web Applications Using Angular

Key Features

  • Learn about the core building blocks of Angular
  • Build and architect high performance web applications
  • Implement the latest JavaScript concepts in ECMAScript 2015, ECMAScript 2016, and TypeScript
  • Leverage the latest Angular features to get the most out of your web...
Securing the Internet of Things
Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues...

Digital Speech: Coding for Low Bit Rate Communication Systems, 2nd Edition
Digital Speech: Coding for Low Bit Rate Communication Systems, 2nd Edition

Building on the success of the first edition Digital Speech offers extensive new, updated and revised material based upon the latest research. This Second Edition continues to provide the fundamental technical background required for low bit rate speech coding and the hottest developments in digital speech coding techniques that...

Unreal Engine 4 Game Development Essentials
Unreal Engine 4 Game Development Essentials

Key Features

  • Get to grips with the user interface of Unreal Engine 4 and find out more about its various robust features
  • Create dream video games with the help of the different tools Unreal Engine 4 offers
  • Create video-games and fully utilize the power of Unreal Engine 4 to bring games to...
Programming in Lua, Second Edition
Programming in Lua, Second Edition

Lua is the language of choice for anyone who needs a scripting language that is simple, efficient, extensible, portable, and free. Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is...

CEH v9: Certified Ethical Hacker Version 9 Study Guide
CEH v9: Certified Ethical Hacker Version 9 Study Guide

The ultimate preparation guide for the unique CEH exam.

The CEH v9: Certified Ethical Hacker Version 9 Study Guide is your ideal companion for CEH v9 exam preparation. This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise,...

Parallel Programming: for Multicore and Cluster Systems
Parallel Programming: for Multicore and Cluster Systems

Innovations in hardware architecture, like hyper-threading or multicore processors, mean that parallel computing resources are available for inexpensive desktop computers. In only a few years, many standard software products will be based on concepts of parallel programming implemented on such hardware, and the range of applications will be...

CEH v9: Certified Ethical Hacker Version 9 Practice Tests
CEH v9: Certified Ethical Hacker Version 9 Practice Tests

Master CEH v9 and identify your weak spots

CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently and gain...

Thinking as Computation: A First Course (MIT Press)
Thinking as Computation: A First Course (MIT Press)

This book guides students through an exploration of the idea that thinking might be understood as a form of computation. Students make the connection between thinking and computing by learning to write computer programs for a variety of tasks that require thought, including solving puzzles, understanding natural language, recognizing objects...

Result Page: 263 262 261 260 259 258 257 256 255 254 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy