Home | Amazing | Today | Tags | Publishers | Years | Search 
Absolute Beginner's Guide to Building Robots
Absolute Beginner's Guide to Building Robots

Finally, a robots book for people who don't know the first thing about robotics! Absolute Beginner's Guide to Robots is well-written, inviting, and action-packed, with engaging ideas and fascinating factoids about robots and robot-related arts and sciences. You are led gently into the...

Network Query Language with CDROM
Network Query Language with CDROM
Learn about an exciting new technology that is revolutionizing network and Internet content delivery

As the first pure language of the content engineering era, Network Query Language (NQL) is the ultimate tool for rapid and simple development of intelligent agents, bots, spiders, middleware, and scalable business-to-business content aggregation...

Moodle Security
Moodle Security

Moving your classes and resources online with a Learning Management System such as Moodle opens up a whole world of possibilities for teaching your students. However, it also opens up a number of threats as your students, private information, and resources become vulnerable to cyber attacks. Learn how to safeguard Moodle to keep the bad guys...

Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies
XMPP: The Definitive Guide: Building Real-Time Applications with Jabber Technologies

This practical book provides everything you need to know about the Extensible Messaging and Presence Protocol (XMPP). This open technology for real-time communication is used in many diverse applications such as instant messaging, Voice over IP, real-time collaboration, social networking, microblogging, lightweight middleware, cloud...

Robot Mechanisms and Mechanical Devices Illustrated
Robot Mechanisms and Mechanical Devices Illustrated
Text offers a one-stop source for everything needed for the mechanical design of state-of-the-art mobile robots. For hobbyists and professionals. Illustrated. Softcover.

The Ultimate Mobile Robot Mechanical Design Reference

Both hobbyists and professionals will treasure this unique and distinctive...

Robots, Androids and  Animatrons, Second Edition : 12 Incredible Projects You Can Build
Robots, Androids and Animatrons, Second Edition : 12 Incredible Projects You Can Build

Bound to stir the imagination and inspire plans.--Poptronics, on John Iovine's PIC Microcontroller Project Book

MORE SENSORS--MORE SMARTS--MORE MOVES--MORE POWER--MORE CONTROL--MORE PROJECTS--LOWER COSTS--AMATEUR ROBOTICS COMES INTO ITS OWN!

Robots, Androids, and Animatrons Second Edition

The time has come for you to...

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Web Analytics For Dummies (Computers)
Web Analytics For Dummies (Computers)
Performing your first Web site analysis just got a whole lot easier. Web Analytics For Dummies offers everything you need to know to nail down and pump up the ROI on your Web presence. It explains how to get the stats you need, then helps you analyze and apply that information to improve traffic and click-through rate on your Web...
Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software
Make: Arduino Bots and Gadgets: Six Embedded Projects with Open Source Hardware and Software

In the early days, embedded systems were built primarily by engineers in a pretty exclusive club. Embedded devices and software tools were expensive, and building a functional prototype required significant software engineering and electrical engineering experience.

With the arrival of Arduino, the open source electronics...

OSSEC Host-Based Intrusion Detection Guide
OSSEC Host-Based Intrusion Detection Guide
November 10th, 2007 – Computer consultant John Kenneth Schiefer plead guilty to four felony charges for his involvement in the compromise of as many as a quarter-million PCs. These compromised systems, or bots, were used to steal money and identities. Schiefer was able to control all of these systems, typically referred to as bot herding,...
Result Page: 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy