-
-
Learn iOS 8 App Development%2C 2nd Edition-Apress%282014%29.pdf
... SDK, but few explain how to develop apps optimally and soundly. This book teaches both core Swift language concepts and how to exploit design patterns and logic with the iOS SDK, based on Swift and the Cocoa Touch framework.
Why spend months or years ...
-
Intel Galileo Networking Cookbook(PACKT,2015)
... applications and the Internet of Things.
The book features several recipes all based on the Intel Galileo board, and that exploit the powerful features of the board. Each chapter explores a given field using the Galileo board.
The book is mainly ...
-
Intel.Galileo.Networking.Cookbook.1785281194
... applications and the Internet of Things.
The book features several recipes all based on the Intel Galileo board, and that exploit the powerful features of the board. Each chapter explores a given field using the Galileo board.
The book is mainly ...
-
Python.3.Object-Oriented.Programming.2nd.Edition.1784398780
... of unit testing and why it's so important in Python
Grasp common concurrency techniques and pitfalls in Python 3
Exploit object-oriented programming in key Python technologies such as Kivy and Django.
Object-oriented programming concurrently with asyncio
...
-
The.Antivirus.Hackers.Handbook.1119028752
... knowledge about software development to evade, attack, and exploit antivirus software-all of which can help you ... for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want ...
-
The Antivirus Hacker's Handbook(Wiley,2015)
... engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software ... new knowledge about software development to evade, attack, and exploit antivirus software - all of which can help you ...
-
-
-
Statistical analyses of measured radar ground clutter data
... strongly
depends on the distribution and spectral characteristics of ground
clutter. To design signal processing algorithms that exploit the
knowledge of clutter characteristics, a preliminary statistical
analysis of ground-clutter data is necessary. We ...
-
Building.a.Recommendation.System.with.R.1783554495
Learn the art of building robust and powerful recommendation engines using R
About This Book
Learn to exploit various data mining techniques
Understand some of the most popular recommendation techniques
This is a step-by-step guide full of real-world ...
-