" "



:






...

.. 1 2 3 4 5 6 7 8 9 10 ... 322

: Collaboration Meets Interactive Spaces
: Craig Anslow and Pedro Campos
: Springer
: 2017
: PDF, EPUB
: 35,4
: / English

This book explores the technological advances and social interactions between interactive spaces, surfaces and devices, aiming to provide new insights into emerging social protocols that arise from the experimentation and long-term usage of interactive surfaces.
: black , 12:19 | : 0 |
: Instinctive Computing
: Yang Cai
: Springer
: 2017
: PDF, EPUB
: 17,4
: / English

This book attempts to connect artificial intelligence to primitive intelligence. It explores the idea that a genuinely intelligent computer will be able to interact naturally with humans. To form this bridge, computers need the ability to recognize, understand and even have instincts similar to humans.
: black , 12:04 | : 0 |

: The Busy Coder's Guide to Android Development 8.4
: Murphy Mark L.
: CommonsWare
: 2017
: PDF
: 4430
: 92 mb
:

The Busy Coder's Guide to Android Development for Android Studio 2.2, covering the Android SDK through 7.1.
Do you want current information about how to develop Android apps? This book covers the latest Android Studio version and the latest version of Android, plus all the information you need to get your apps working on older devices. This book contains over 200 chapters, covering everything from the first steps in getting an app going to advanced development techniques.
: na5ballov , 07:36 | : 0 |
: Kali Linux Wireless Penetration Testing Essentials
: Marco Alamanni
: Packt Publishing
: 2015
: EPUB
: 15,8
: / English

Kali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools.

This book introduces you to wireless penetration testing and describes how to conduct its various phases. After showing you how to install Kali Linux on your laptop, you will verify the requirements of the wireless adapter and configure it. Next, the book covers the wireless LAN reconnaissance phase, explains the WEP and WPA/WPA2 security protocols and demonstrates practical attacks against them using the tools provided in Kali Linux, Aircrack-ng in particular. You will then discover the advanced and latest attacks targeting access points and wireless clients and learn how to create a professionally written and effective report.
: black 22-03-2017, 23:15 | : 0 |

: Google Maps javascript API cookbook: over 50 recipes to help you create web maps and GIS web applications using the Google Maps javascript API
: Dincer, Alper; Uraz, Balkan
: Birmingham, UK: Packt Pub.
: 2013
: pdf
: 299
: 15,1 mb
: English

Day by day, the use of location data is becoming more and more popular, and Google is one of the main game changers in this area. The Google Maps javascript API is one of the most functional and robust mapping APIs used among Geo developers. With Google Maps, you can build location-based apps, maps for mobile apps, visualize geospatial data, and customize your own maps.
: daromir 22-03-2017, 23:00 | : 0 |
: Prototyping of User Interfaces for Mobile Applications
: Benjamin B?hr
: Springer
: 2017
: PDF, EPUB
: 25,8
: / English

This book investigates processes for the prototyping of user interfaces for mobile apps, and describes the development of new concepts and tools that can improve the prototype driven app development in the early stages. It presents the development and evaluation of a new requirements catalogue for prototyping mobile app tools that identifies the most important criteria such tools should meet at different prototype-development stages. This catalogue is not just a good point of orientation for designing new prototyping approaches, but also provides a set of metrics for a comparing the performance of alternative prototyping tools.
: black 22-03-2017, 22:56 | : 0 |
: Design Recipes for FPGAs: Using Verilog and VHDL
: Peter Wilson
: Newnes
: 2016
: PDF
: 18,5
: / English

This book provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, it provides design techniques and templates at all levels, together with functional code, which you can easily match and apply to your application. Written in an informal and easy to grasp style, this invaluable resource goes beyond the principles of FPGAs and hardware description languages to demonstrate how specific designs can be synthesized, simulated and downloaded onto an FPGA. In addition, the book provides advanced techniques to create real world designs that fit the device required and which are fast and reliable to implement.
: black 22-03-2017, 22:51 | : 0 |
: Hacking Exposed Industrial Control Systems
: Clint Bodungen, Bryan Singer, Aaron Shbeeb and Kyle Wilhoit
: McGraw-Hill Education
: 2016
: FB2, EPUB
: 28,1
: / English

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating?and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using ICS safe methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.
: black 22-03-2017, 22:38 | : 0 |
: Scala Design Patterns Patterns for Practical Reuse and Design
: John Hunt
: Springer
: 2013
: PDF, EPUB
: 28,2
: / English

Scala is a new and exciting programming language that is a hybrid between object oriented languages such as Java and functional languages such as Haskell. As such it has its own programming idioms and development styles.

Scala Design Patterns looks at how code reuse can be successfully achieved in Scala. A major aspect of this is the reinterpretation of the original Gang of Four design patterns in terms of Scala and its language structures (that is the use of Traits, Classes, Objects and Functions). It includes an exploration of functional design patterns and considers how these can be interpreted in Scala's uniquely hybrid style.
: black 22-03-2017, 22:29 | : 0 |

: Algorithms: Design and Analysis
: Harsh Bhasin
: Packt Publishing
: 2015
: 692
: PDF
: 59 Mb
: English

Algorithms: Design and Analysis of is a textbook designed for the undergraduate and postgraduate students of computer science engineering, information technology, and computer applications. It helps the students to understand the fundamentals and applications of algorithms. The book has been divided into four sections: Algorithm Basics, Data Structures, Design Techniques and Advanced Topics. The first section explains the importance of algorithms, growth of functions, recursion and analysis of algorithms.
: bhaer 22-03-2017, 19:21 | : 0 |

.. 1 2 3 4 5 6 7 8 9 10 ... 322

 MirKnig.Su  2017