Software Development Metrics
R in Action, Second Edition
Oculus Rift in Action
Learning AndEngine
jMonkeyEngine 3.0 Cookbook
jBPM 6 Developer Guide
Scratch 2.0 Game Development
Data Analytics
A Practical Guide to TPM 2.0
Learning iOS Forensics
Python Hacking Essentials
Security Intelligence
Web Security
Storm Applied
Storm Applied is a practical guide to using Apache Storm for the real-world tasks associated with processing and analyzing real-time data streams. Thi ...
Software Development Metrics
Software Development Metrics is a handbook for anyone who needs to track and guide software development and delivery at the team level, such as projec ...
Rails 4 in Action, Second Editi ...
Rails 4 in Action is a comprehensive introduction to Rails that guides you hands-on through all you’ll need to become a competent and confident Rails ...
R in Action, Second Edition
R in Action, Second Edition presents both the R language and the examples that make it so useful for business developers. Focusing on practical soluti ...
Oculus Rift in Action
Oculus Rift in Action introduces the powerful Oculus Rift headset and teaches you how to integrate its many features into 3D games and other virtual r ...
OCP Java SE 7 Programmer II Cer ...
OCP Java SE 7 Programmer II Certification Guide is a concise, focused study guide that prepares you to pass the OCP Java SE 7 Programmer II exam (1Z0- ...
Learn Git in a Month of Lunches
Learn Git in a Month of Lunches introduces the discipline of source code control using Git. Whether you’re a newbie or a busy pro moving your source c ...
Groovy in Action, Second Editio ...
Groovy in Action, Second Edition is a thoroughly revised, comprehensive guide to Groovy programming. It introduces Java developers to the dynamic feat ...
The Antivirus Hacker’s Handbook
Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker’s Handbook guides you through the process of reverse engineering ...
Learning AndEngine
AndEngine is a very popular open source OpenGL (open graphics library) Android game engine, used to create mobile games quickly while maintaining the ...
jQuery for Designers: Beginners ...
This book offers approachable and beginner-friendly lessons for designers with little or no background in JavaScript. It helps unmask the popular Java ...
Joomla! 3 Beginner’s Guide, Sec ...
Taking full advantage of all the new features and enhancements added to the 2014 release of Joomla 3, this practical guide starts by teaching you how ...
jMonkeyEngine 3.0 Cookbook
This book provides you with engaging hands-on game development tips that will keep the game we’ll be developing in focus. Each chapter will provide in ...
jBPM 6 Developer Guide
jBPM6 Developer Guide will guide you through each level of the jBPM6 platform, allowing you to model and build applications that will automate your bu ...
Scratch 2.0 Game Development
Playing video games is fun, however, it’s even more fun to make your own! Scratch 2.0 makes that challenge a lot easier. Instead of diving into abstra ...
Data Analytics
This book is a comprehensive introduction to the methods and algorithms and approaches of modern data analytics. It covers data preprocessing, visuali ...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows secur ...
Learning iOS Forensics
Mobile device forensics relates to the recovery of data from a mobile device. It has an impact on many different situations including criminal investi ...
Mastering Wireless Penetration ...
Penetration testing is a tool for testing computer systems, networks, or web applications to find vulnerabilities that an attacker could exploit. By p ...
Penetration Testing with Raspbe ...
The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspbe ...
Python Hacking Essentials
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Her ...
Python Penetration Testing Esse ...
This book is a practical guide that shows you the advantages of using Python for pentesting with the help of detailed code examples. We start by explo ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...
Web Security
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of ...
Channel Coding Techniques for W ...
The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes (LDPC), space-time coding, ...