veronica avluv megapack | Streamango | After Earth
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learn Android Studio: Build Android Apps Quickly and Effectively
Learn Android Studio: Build Android Apps Quickly and Effectively

Learn Android Studio covers Android Studio and its rich tools ecosystem, including Git and Gradle: this book covers how Android Studio works seamlessly with Git, for source control, and Gradle, a build and test tool. In addition, this book demonstrates how to develop/collaborate with remote Git web-hosting services such as GitHub and...

Cybersecurity for Executives: A Practical Guide
Cybersecurity for Executives: A Practical Guide

Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business

  • Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues
  • Covers 'What to...
PostGIS Essentials
PostGIS Essentials

Learn how to build powerful spatial database solutions with PostGIS quickly and efficiently

About This Book

  • Learn how to construct your own solutions using the most exciting Geographic Information System (GIS) tool on the market, PostGIS
  • Use this book to develop a complete GIS application...
php|architect's Guide to Web Scraping
php|architect's Guide to Web Scraping

Today , there aremany services out there providing news feeds, and there are plenty of code libraries that can parse this data. So, with the proliferation of web services and public APIs, why is web scraping still so important to the future of the Web? It is important because of the rise ofmicroformats, Semantic Web technologies, theW3C...

Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions)
Mastering Financial Mathematics in Microsoft Excel: A Practical Guide for Business Calculations (Market Editions)
Tools enabling managers to carry out financial calculations have evolved in the last 20 years from tables through calculators to programs on PCs and personal organisers. Today, the majority of those in finance have Excel on their desks and increasingly on their laptops or pocket computers.

Mastering Financial Mathematics in Microsoft...

Big Data Glossary
Big Data Glossary

To help you navigate the large number of new data tools available, this guide describes 60 of the most recent innovations, from NoSQL databases and MapReduce approaches to machine learning and visualization tools. Descriptions are based on first-hand experience with these tools in a production environment.

This handy...

TypeScript Design Patterns
TypeScript Design Patterns

Key Features

  • This step-by-step guide will would demonstrate all the important design patterns in practice
  • This book is the only documentation on the market focusing on design patterns in TypeScript
  • This book is packed with rich examples that will improve...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE
Advanced API Security: Securing APIs with OAuth 2.0, OpenID Connect, JWS, and JWE

Advanced API Security is a complete reference to the next wave of challenges in enterprise security--securing public and private APIs.

API adoption in both consumer and enterprises has gone beyond predictions. It has become the ‘coolest’ way of exposing business functionalities to the outside world....

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Distibuted Systems: Design and Algorithms
Distibuted Systems: Design and Algorithms

In today’s digital environment, distributed systems are increasingly present in a wide variety of environments, ranging from public software applications to critical systems.

Distributed Systems introduces the underlying concepts, the associated design techniques and the related security issues.
Distributed Systems:
...

Effective Programming: More Than Writing Code
Effective Programming: More Than Writing Code

ABOUT THE BOOK Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily...

Result Page: 130 129 128 127 126 125 124 123 122 121 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy