Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
15 Dangerously Mad Projects for the Evil Genius
15 Dangerously Mad Projects for the Evil Genius

UNLEASH YOUR INNER MAD SCIENTIST!

"Wonderful. I learned a lot reading the detailed but easy to understand instructions."--BoingBoing

This wickedly inventive guide explains how to design and build 15 fiendishly fun electronics projects. Filled with photos and illustrations, 15 Dangerously Mad Projects for...

ARM Assembly Language Programming
ARM Assembly Language Programming
Like most interesting subjects, assembly language programming requires a little background knowledge before you can start to appreciate it. In this chapter, we explore these basics. If terms such as two's complement, hexadecimal, index register and byte are...
Nanoalloys: From Fundamentals to Emergent Applications
Nanoalloys: From Fundamentals to Emergent Applications

Nanoalloys: From Fundamentals to Emergent Applications presents and discusses the major topics related to nanoalloys at a time when the literature on the subject remains scarce. Particular attention is paid to experimental and theoretical aspects under the form of broad reviews covering the most recent developments. The book is...

Joining and Assembly of Medical Materials and Devices (Woodhead Publishing Series in Biomaterials)
Joining and Assembly of Medical Materials and Devices (Woodhead Publishing Series in Biomaterials)

As medical devices become more intricate, with an increasing number of components made from a wide range of materials, it is important that they meet stringent requirements to ensure that they are safe to be implanted and will not be rejected by the human body. Joining and assembly of medical materials and devices provides a comprehensive...

Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Exploring C++: The Programmer's Introduction to C++
Exploring C++: The Programmer's Introduction to C++
Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other...
Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)
Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)

Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control.

The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor...

Windows Assembly Language & Systems Programming: 16- And 32-Bit Low-Level Programming for the PC and Windows
Windows Assembly Language & Systems Programming: 16- And 32-Bit Low-Level Programming for the PC and Windows

Provides Windows programmers with details of and deep insights into the inner system functions of Microsoft Windows Essential for Win95 and other advanced Windows programmers Ideal for software developers who are moving applications from Windows 3.x t o Windows 95 Includes disk of example programs, source code, documentation, and...

Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks
Mastering Malware Analysis: The complete malware analyst's guide to combating malicious software, APT, cybercrime, and IoT attacks

Master malware analysis to protect your systems from getting infected

Key Features

  • Set up and model solutions, investigate malware, and prevent it from recurring
  • Learn core concepts relating to dynamic malware analysis, memory forensics, decryption, and much more
  • ...
Nanochemistry, Second Edition
Nanochemistry, Second Edition

The second edition of Nanochemistry covers the main studies of nanoparticle production, reactions, and compounds, and reviews the work of leading scientists from around the world. This book is the first monograph on nanochemistry, giving perspectives on the present status and future possibilities in this rapidly advancing discipline....

The Personal MBA: Master the Art of Business
The Personal MBA: Master the Art of Business

Getting an MBA is an expensive choice-one almost impossible to justify regardless of the state of the economy. Even the elite schools like Harvard and Wharton offer outdated, assembly-line programs that teach you more about PowerPoint presentations and unnecessary financial models than what it takes to run a real business. You can get...

Reversing: Secrets of Reverse Engineering
Reversing: Secrets of Reverse Engineering

Sometimes, the best way to advance is in reverse

If you want to know how something works, you take it apart very carefully. That's exactly what this book shows you—how to deconstruct software in a way that reveals design and implementation details, sometimes even source code. Why? Because reversing reveals weak spots, so...

unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy