Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with OAuth 2.0
Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers...
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
Programming iOS 5: Fundamentals of iPhone, iPad, and iPod touch Development
With the advent of version 2 of the iPhone system, Apple proved they could do a remarkable thing — adapt their existing Cocoa computer application programming framework to make applications for a touch-based device with limited memory and speed and a dauntingly tiny display. The resulting Cocoa Touch framework, in...
ActionScript Developer's Guide to PureMVC
ActionScript Developer's Guide to PureMVC

Too often in the development of a large application, the developer must stop and think about where to find some class he needs, where some new class should go, and how to wire them up in such a way that gets data from wherever it lives to a display so the user can interact with it or vice-versa.

SharePoint 2010 for Project Management
SharePoint 2010 for Project Management
Do you find yourself asking for more time whenever you work on a project? Do you ever get the extra time you asked for? Well, if you’re like me, you rarely get the extra time you need from your customers. This got me thinking about how I can buy more time for my projects. I decided to find out if I could gain more time by reducing...
Making Musical Apps: Real-time audio synthesis on Android and iOS
Making Musical Apps: Real-time audio synthesis on Android and iOS
Pure Data (Pd) is a programming language for digital audio and more. Written by Miller Puckette in the 1990s and under active development ever since, Pd has established itself as one of the leading open-source packages for computer music, and it remains largely interoperable with its commercial cousin, Max/MSP. A Pd program,...
Think Complexity: Complexity Science and Computational Modeling
Think Complexity: Complexity Science and Computational Modeling
This book is inspired by boredom and fascination: boredom with the usual presentation of data structures and algorithms, and fascination with complex systems. The problem with data structures is that they are often taught without a motivating context; the problem with complexity science is that it is usually not taught at...
APIs: A Strategy Guide
APIs: A Strategy Guide
APIs are a big deal and they are getting bigger. Pioneering companies such as Google, Facebook, Apple, and Twitter have exposed amazing technological solutions to the public, transforming existing businesses and creating new industries. Central to these companies’ successes are the APIs that link people and...
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
iPod: The Missing Manual
iPod: The Missing Manual
What a difference a decade makes. When Apple introduced the very first iPod back in October 2001, it was a bulky chunk of white plastic, chrome, and glass that held a mere 5 gigabytes of music. But its concept was simple and enticing: you could carry 1,000 songs around in your pocket. And people did.
 
Arduino Cookbook
Arduino Cookbook
This book was written by Michael Margolis with Nick Weldin to help you explore the amazing things you can do with Arduino. Arduino is a family of microcontrollers (tiny computers) and a software creation environment that makes it easy for you to create programs (called sketches) that can interact with the...
Inside Cyber Warfare: Mapping the Cyber Underworld
Inside Cyber Warfare: Mapping the Cyber Underworld
I was recently invited to participate in a cyber security dinner discussion by a few members of a well-known Washington, DC, think tank. The idea was that we could enjoy a fine wine and a delicious meal while allowing our hosts to pick our brains about this “cyber warfare stuff.” It seems that the new...
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
Application Security for the Android Platform: Processes, Permissions, and Other Safeguards
The purpose of this book is to convey vital knowledge about application security to developers working on the Android platform, to enable the development of robust, rugged, and more secure applications. While application security knowledge and skills have matured rapidly over the past couple of years, that...
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy