In this fascinating book, the author traces the careers, ideas, discoveries, and inventions of two renowned scientists, Athanasius Kircher and Galileo Galilei, one a Jesuit, the other a sincere man of faith whose relations with the Jesuits deteriorated badly. The Author documents Kircher’s often intuitive work in many areas, including...
Fully updated for iOS 7, iOS UICollectionView: The Complete Guide, Second Edition will help you build highly immersive, cutting-edge iOS user interfaces that transform your apps from good to great! Ash Furrow...
This book is the perfect introduction to sophisticated concepts in MapReduce and will ensure you have the knowledge to optimize job performance. This is not an academic treatise; it's an example-driven tutorial for the real world.
An exhaustive and timely overview of renewable polymers from a respected chemist and successful author
The recent explosion of interdisciplinary research has fragmented the knowledge base surrounding renewable polymers. The Chemistry of Bio-based Polymers brings together, in one volume, the research and work of...
Many leaders are unaware of the amazing power of questions. Our conversations may be full of requests and demands, but all too often we are not asking for honest and informative answers, and we don’t know how to listen effectively to responses. When leaders start encouraging questions from their teams, however, they begin to see amazing...
Atmel's AVR microcontrollers are the chips that power Arduino, and are the go-to chip for many hobbyist and hardware hacking projects. In this book you'll set aside the layers of abstraction provided by the Arduino environment and learn how to program AVR microcontrollers directly. In doing so, you'll get closer to the...
Learn to identify the social engineer by non-verbal behavior
Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and...
Analyzing how hacks are done, so as to stop them in the future
Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...
The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!
Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he...
Materials are the stuff of design. From the very beginning of human history, materials have been taken from the natural world and shaped, modified, and adapted for everything from primitive tools to modern electronics. This renowned book by noted materials engineering author Mike Ashby and industrial designer Kara Johnson explores the role of...
Pro Microsoft HDInsight is a complete guide to deploying and using Apache Hadoop on the Microsoft Windows Azure Platforms. The information in this book enables you to process enormous volumes of structured as well as non-structured data easily using HDInsight, which is Microsoft’s own distribution of Apache Hadoop....
Discover how to streamline the creation of mobile applications for Android and iOS with Xamarin. For C# developers, this book is the most practical way yet to start mastering cross-platform development.
Overview
Write native iOS and Android applications with Xamarin