Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone Home Automation
BeagleBone Home Automation

The Internet of Things is now being taken up by tech corporations but this fantastic book brings you the DIY approach to home automation using BeagleBone. From dimming the lights to opening the garage door -- it's all here.

Overview

  • Practical approach to home automation using BeagleBone; starting from...
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption
Securing Web Services with WS-Security : Demystifying WS-Security, WS-Policy, SAML, XML Signature, and XML Encryption

The most up to date, comprehensive, and practical guide to Web services security, and the first to cover the final release of new standards SAML 1.1 and WS-Security.>

  • Comprehensive coverage and practical examples of the industry...

AARP Protecting Yourself Online For Dummies
AARP Protecting Yourself Online For Dummies
The Internet has become an integral part of our lives in the  blink of an eye; it’s been only about 20 years or so since the  web came on the consumer scene, and now many of us couldn’t  imagine life without it. We use it to check news stories, watch  movies, balance bank accounts, buy any number...
Implementing Backup and Recovery: The Readiness Guide for the Enterprise
Implementing Backup and Recovery: The Readiness Guide for the Enterprise
Arm yourself with all the information you need to architect a backup and recovery system

System backup is essential in any enterprise–protecting data is equivalent to protecting the company or agency. Whether you have the task of putting together a backup and recovery system for your organization or you are thinking about how backup and...

Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)
Foundations of Security: What Every Programmer Needs to Know (Expert's Voice)
Dr. Gary McGraw, a well-known software security expert, said, “First things first—make sure you know how to code, and have been doing so for years. It is better to be a developer (and architect) and then learn about security than to be a security guy and try to learn to code” (McGraw 2004). If you are interested in becoming a...
The Power of Persuasion: How We're Bought and Sold
The Power of Persuasion: How We're Bought and Sold

"An engaging, highly readable survey of the sophisticated methods of persuasion we encounter in various situations. From television to telemarketing and from self-deception to suicide cults, Levine takes a hard look at all the ways we attempt to persuade each other--and how and why they work (or don't). . . . The next time you wonder...

MSP430 Microcontroller Basics
MSP430 Microcontroller Basics
A complete starter kit for the engineer that wants to master the Texas Instruments' very popular MSP430 microcontroller!
The MSP430 is a simple 16-bit microcontroller with a compact and economical CPU containing only 27 instructions and 16 registers. It offers other advantages which make it suitable for low power applications: a rich
...
Advertising on Google: The High Performance Cookbook
Advertising on Google: The High Performance Cookbook

Cracking pay-per-click on Google can increase your visitor numbers and profits. Here are over 120 practical recipes to help you set up, optimize and manage your Adwords campaign with step-by-step instructions.

Overview

  • Set up your Adwords account and track results beyond the click
  • Create...
Android NDK Beginner's Guide
Android NDK Beginner's Guide
The short history of computing machines has witnessed some major events, which forever transformed our usage of technology. From the first massive main frames to the democratization of personal computers, and then the interconnection of networks. Mobility is the next revolution. Like the primitive soup, all the ingredients are now...
Making Things See: 3D vision with Kinect, Processing, Arduino, and MakerBot (Make: Books)
Making Things See: 3D vision with Kinect, Processing, Arduino, and MakerBot (Make: Books)

This detailed, hands-on guide provides the technical and conceptual information you need to build cool applications with Microsoft’s Kinect, the amazing motion-sensing device that enables computers to see. Through half a dozen meaty projects, you’ll learn how to create gestural interfaces for software, use motion capture...

Network Performance Analysis: Using the J Programming Language
Network Performance Analysis: Using the J Programming Language
The J programming laguage is rich in mathematical functionality and ideally suited to analytical computing methods. It is, however, a somewhat terse language and not entirely intuitive at first, particularly if one is used to more conventional programming languages such as C, Pascal or Java. J functions (called verbs) are denoted by punctuation...
Practical UML Statecharts in C/C++, Second Edition: Event-Driven Programming for Embedded Systems
Practical UML Statecharts in C/C++, Second Edition: Event-Driven Programming for Embedded Systems
Streamline your embedded code projects with just one book - Miro Samek presents UML statecharts - a practical, time-saving design methodology!

Practical UML Statecharts in C/C++ Second Edition bridges the gap between high-level abstract concepts of the Unified Modeling Language (UML) and the actual programming aspects of modern
...
unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy