|
|
|
Beginning Software Engineering
A complete introduction to building robust and reliable software
Beginning Software Engineering demystifies the software engineering methodologies and techniques that professional developers use to design and build robust, efficient, and consistently reliable software. Free of jargon and assuming no previous... | | Android Application Development All-in-One For Dummies
Your all-encompassing guide to learning Android app development
If you're an aspiring or beginning programmer interested in creating apps for the Android market—which grows in size and downloads every day—this is your comprehensive, one-stop guide. Android Application Development All-in-One For Dummies... | | How to Succeed in College and Beyond: The Art of Learning
How to Succeed in College and Beyond is an insightful, inspired guide to the undergraduate experience that helps students balance the joy of learning with the necessity of career preparation.
-
Features a wealth of advice for getting the most from an undergraduate education, especially inthe areas of arts and...
|
|
|
The DSLR Filmmaker's Handbook: Real-World Production Techniques
Learn to shoot professional-quality HD footage with your DSLR Camera
The DSLR Filmmaker's Handbook, 2nd Edition is the expert guide to getting professional movie-making results with an HD video-enabled DSLR camera. Fully updated to reflect the latest technology, this updated edition provides guidance toward best... | | Linux Command Line and Shell Scripting Bible
Welcome to the third edition of Linux Command Line and Shell Scripting Bible. Like all books in the Bible series, you can expect to fi nd both hands-on tutorials and real-world information, as well as reference and background information that provide a context for what you are learning. This book is a fairly comprehensive resource on the... | | The Network Security Test Lab: A Step-by-Step Guide
The ultimate hands-on guide to IT security and proactivedefense
The Network Security Test Lab is a hands-on, step-by-stepguide to ultimate IT security implementation. Covering the fullcomplement of malware, viruses, and other attack technologies, thisessential guide walks you through the security assessment... |
|
Result Page: Previous 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 Next |