The demand for mobile applications across Android, iOS, and Windows platforms often puts developers accustomed to .NET and C# in a bind. The gap between platform operating systems, programming languages, and devices is an immense obstacle. Ideally, these developers would be able use their existing skills and knowledge to build native mobile apps. X...
Learn how to leverage the BlackBerry 10 Cascades framework to create rich native applications. Learn BlackBerry 10 App Development gives you a solid foundation for creating BlackBerry 10 apps efficiently. Along the way, you will learn how to use QML and JavaScript for designing your app's UI, and C++/Qt for the application logic. No prior know...
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of information security, writte...
Microsoft Press is pleased to offer the second edition of Kraig Brockschmidt's in-depth ebook on writing Windows Store apps using HTML, CSS3, and JavaScript on the Windows 8.1 platform. The ebook includes 20 chapters and 4 appendices....
This book shall provide you a walk through the different aspect of application development using Qt version 5.x. It focuses on the new Qt Quick technology but also provides necessary information of writing C++ back-ends and extension for Qt Quick....
In Google Maps API Succinctly, Mark Lewin gives you a hands-on, beginner-level introduction to developing mapping applications using the Google Maps JavaScript API. Learn the ins and outs of the API so that you can harness the power of Google Maps within your own websites and applications. Lewin will take you from requesting an API key, through add...
In Implementing a Custom Language Succinctly, Succinctly series author Vassili Kaplan demonstrated how to create a customized programming language. Now, he returns to showcase how you can use that language to build fully functional mobile apps. In Writing Native Mobile Apps in a Functional Language Succinctly, you will build off the skills you'...
The demand for mobile applications across Android, iOS, and Windows platforms often puts developers accustomed to .NET and C# in a bind. The gap between platform operating systems, programming languages, and devices is an immense obstacle. Ideally, these developers would be able use their existing skills and knowledge to build native mobile apps. X...
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
Modern Microsoft is much more than Windows, and to reach their full potential developers must be able to reach users on the many platforms they use. To facilitate this, Microsoft created Universal Windows Platform (UWP) to make development across multiple platforms simultaneously an achievable goal. In UWP Succinctly, the first part of a series, au...
The fact that current compact cameras produce good (or at least, adequate) pictures in most photographic situations is at the root of this book. The main aim of the book is to show how such a camera can be operated and its controls tweaked to cover many different photographic conditions and requirements. (To put it another way, the chief goal of th...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.
Man...
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.
The authors, a uniquely skilled team of...
This book chronicles the rise of a new scientific paradigm offering novel insights into the age-old enigmas of existence. Over 300 years ago, the human mind discovered the machine code of reality: mathematics. By utilizing abstract thought systems, humans began to decode the workings of the cosmos. From this understanding, the current scientific pa...
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
This book introduces new methods for measuring and analyzing residential segregation. It begins by placing all popular segregation indices in the "difference of group means" framework wherein index scores can be obtained as simple differences of group means on individual-level residential attainments scored from area racial composition. ...
This book presents the concept of value as the central component to success and longevity of the global ICT industry player, Huawei. It provides examples of how Huawei focuses on customers to pursue sustainable and profitable growth rather than focusing on capital market valuation, which is a familiar scenario among Western companies. It is the bus...
This book presents nine outstanding doctoral dissertations in Information Technology from the Department of Electronics, Information and Bioengineering, Politecnico di Milano, Italy. Information Technology has always been highly interdisciplinary, as many aspects have to be considered in IT systems. The doctoral studies program in IT at Politecnico...
Consumer networks have revolutionized the way companies understand and reach their customers, making possible intricate measurement and accurate prediction at every step of every transaction. The same revolution is underway in our infrastructure, where new generations of sensor-laden power plants, cars and medical devices will generate vast quantit...
This book explores the key dimensions of a future education system designed to enable individuals, schools, and communities to achieve the twin twenty-first century challenges of sustainability and human well-being. For much of the twentieth century, Western education systems prepared students to enter the workforce, contribute to society and succe...
Digital Video Concepts, Methods, and Metrics: Quality, Compression, Performance, and Power Trade-off Analysis is a concise reference for professionals in a wide range of applications and vocations. It focuses on giving the reader mastery over the concepts, methods and metrics of digital video coding, so that readers have sufficient understanding to...
This open access book provides an alternative theoretical framework of irregular migration that allows to overcome many of the contradictions and theoretical impasses displayed by the majority of approaches in current literature. The analytical framework allows moving from an interpretation biased by methodological nationalism, to a more general sy...
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
Read the tips and tricks that top developers from the .NET and SQL Server communities use to boost code and query performance in their applications.
50 tips from the .NET and SQL Server communities for boosting performance in your .NET application; Learn the secrets of your fellow developers and read advice from MVPs and other experts; Covers pe...
The HTML5 Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Video games are a massive market, but reaching an audience requires supporting many platforms. MonoGame offers a near-complete implementation of XNA 4 that makes it possible to develop games for iOS, Android, Mac OS X, Linux, Windows, PlayStation Vita, Xbox One, and PlayStation 4. In MonoGame Succinctly, author Jim Perry offers an introduction to M...
In this second e-book on Java, Christopher Rose takes readers through some of the more advanced features of the language. Java Succinctly Part 2 explores powerful and practical features of Java, such as multithreading, building GUI applications, and 2-D graphics and game programming. Then learn techniques for using these mechanisms in coherent proj...
The Xamarin.Forms Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Use the guidance in this comprehensive field guide to gain the support of your top executives for aligning a rational cybersecurity plan with your business. You will learn how to improve working relationships with stakeholders in complex digital businesses, IT, and development environments. You will know how to prioritize your security program, and...
Blazor is a new web framework that changes what is possible when building web apps with .NET. Blazor is a client-side web UI framework based on C# instead of JavaScript. With Blazor you can write your client-side logic and UI components in C#, compile them into normal .NET assemblies, and then run them directly in the browser using a new open web s...