-
-
Xcode.7.Essentials.2nd.Edition.178588
... and find out how they can be implemented
Create custom components for your application through frameworks and live previews
Exploit Xcode’s advanced features to elevate your debugging and testing capabilities
Run your application on the physical device ...
-
High-Performance Computing on Complex Environments(Wiley,2014)
... recent research results in high-performance computing on complex environments, information on how to efficiently exploit heterogeneous and hierarchical architectures and distributed systems, detailed studies on the impact of applying heterogeneous ...
-
An Introduction to Machine Learning
... networks, and support vector machines. Later chapters show how to combine these simple tools by way of “boosting,” how to exploit them in more complicated domains, and how to deal with diverse advanced practical issues. One chapter is dedicated to the ...
-
High-Performance Computing on Complex Environments
... recent research results in high-performance computing on complex environments, information on how to efficiently exploit heterogeneous and hierarchical architectures and distributed systems, detailed studies on the impact of applying heterogeneous ...
-
Seven Concurrency Models in Seven Weeks(Pragmatic,2014)
... issues with traditional threads and locks development. Learn how to exploit the parallelism in your computer's GPU and leverage ... high-quality code.
This book will show you how to exploit different parallel architectures to improve your code's performance, ...
-
Network Forensics: Tracking Hackers through Cyberspace
... ’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Throughout the text, step-by-step case studies guide you through the analysis of network-based ...
-
-
Beginning Game Development with Python and Pygame
... worked on the MotorStorm game for Play Station 3, youll be privy to insights that will not only help you to exploit PyGame to its maximum potential, but also make you a more creative and knowledgeable games developer all round., Create advanced games by ...
-
Secure Your Node.js Web Application(Pragmatic,2016)
Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these ...
-
Clojure High Performance Programming(PACKT,2ed,2015)
... tools
Master techniques to achieve numerical performance in Clojure
Use Criterium library to measure latency of Clojure expressions
Exploit Java features in Clojure code to enhance performance
Avoid reflection and boxing with type hints
Understand Clojure ...
-