Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 1661

The inside story of how America's enemies launched a cyber war against us-and how we've learned to fight back With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us. In this dramatic book, former Assistant Attorney... more...

This 320-page book is an exhaustive guide to The Legend of Zelda from the original The Legend of Zelda to Twilight Princess HD. Make sure to check out the other installments in this unparalleled collection of historical information on the Legend of Zelda Franchise with the New York Times Best Selling books The Legend of Zelda: Hyrule Historia and The Legend of Zelda: Art & Artifacts! A comprehensive collection of enemies and items, potions to... more...

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive... and leave it at that. I go... more...

Learn the fundamentals of Java EE 8 APIs to build effective web services Key Features Design modern and stylish web services with Java EE APIs Secure your web services with JSON Web Tokens Explore the advanced concepts of RESTful web services and the JAX-RS API Book Description Java Enterprise Edition is one of the leading application programming platforms for enterprise Java development. With Java EE 8 finally... more...

Games Girls Play examines the role that video games play in girls’ lives, including how games structure girls’ leisure time, how playing video games constitutes different performances of femininity, and what influences girls to play or not play video games. Through interviews, focus groups, and qualitative content analyses, this book analyzes girls’ involvement with video games. It also examines different contexts in which discourses of girls and... more...


In this Wrox Blox, you will learn how to obtain and access the Mac App Store from your Mac. You will also learn about the opportunities available for developers who want to venture into the Mac market. This Wrox Blox also walks you through the steps you need to perform to publish your apps in the Mac App Store. You will use the Xcode 4 development tool provided by Apple to develop a Mac OS X application, and then see how it can be published in the Mac... more...

Programmers used to be the only people excited about APIs, but now a growing number of companies see them as a hot new product channel. This concise guide describes the tremendous business potential of APIs, and demonstrates how you can use them to provide valuable services to clients, partners, or the public via the Internet. You’ll learn all the steps necessary for building a cohesive API business strategy from experts in the trenches.Facebook and... more...

We have unsatisfactory experiences when we use banks, buses, health services and insurance companies. They don't make us feel happier or richer. Why are they not designed as well as the products we love to use such as an Apple iPod or a BMW? The 'developed' world has moved beyond the industrial mindset of products and the majority of 'products' that we encounter are actually parts of a larger service network. These services comprise people,... more...

Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government... more...

“Twenty years of hindsight prove how deeply Tapscott understood the impact the Internet would have on the way we live, work, play and learn. This important book, now updated, is just as relevant today as it was then.” John Chambers, Chairman and CEO, Cisco With a new foreword by Eric Schmidt, Chief Executive of Google Two decades ago, The Digital Economy changed the way the world thought about the Web and Internet. While... more...