Python for Everyone
Cay Horstmann's Python for Everyone
provides readers with step-by-step guidance, a feature that is immensely helpful for building confidence and providing an outline for the task at hand. “Problem Solving” sections stress the importance of design and planning while “How...
Hibernate Search by Example
Explore the Hibernate Search system and use its extraordinary search features in your own applications
Add search capability to your custom applications
Integrate with the core Hibernate system, using traditional APIs or JPA
Write search queries in no time that may...
Unity 4.x Cookbook
Maximize the potential of Unity 4 with this wide-ranging book. Your games will look better, play more realistically, and communicate with more devices through applying these fully explanatory recipes.
A wide range of topics are covered, ranging in complexity, offering something for every Unity 4...
Instant PhoneGap Social App Development
Consume social network feeds and share social network content using native plugins and PhoneGap
Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
This book will guide you through using the Twitter JSON API and Phonegap as a simple way to...
Developing Android on Android: Automate Your Device with Scripts and Tasks
Take advantage of the open, tinker-friendly Android platform and make your device work the way you want it to. Quickly create Android tasks, scripts, and programs entirely on your Android device--no PC required. Learn how to build your own innovative Android programs and workflows with tools you can run on Android itself, and tailor the...
Quantum Attacks on Public-Key Cryptosystems
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...
|Result Page: Previous 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next |