Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Getting Started with Electronic Projects
Getting Started with Electronic Projects

Build thrilling and intricate electronic projects using LM555, ZigBee, and BeagleBone

About This Book

  • Get acquainted with fundamental concepts such as tools and circuits required for the projects
  • Develop stunning cost-effective projects and build your own range of designs including...
Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)
Algorithmic Information Theory: Mathematics of Digital Information Processing (Signals and Communication Technology)
This book deals with information processing; so it is far from being a book on information theory (which would be built on description and estimation). The reader will be shown the horse, but not the saddle. At any rate, at the very beginning, there was a series of lectures on “Information theory, through the looking-glass of an...
Pro Crystal Enterprise / BusinessObjects XI Programming
Pro Crystal Enterprise / BusinessObjects XI Programming

Pro Crystal Enterprise/BusinessObjects XI Programming shows you how to create customized solutions using the Business Objects/Crystal Enterprise object model. Here youll see the object model utilized to create professional-quality tools like on-demand web services, report metadata extraction, scheduling, security, and user...

Assembly Language Step-By-Step
Assembly Language Step-By-Step
What astonishes me about learning how to program is not that it's so hard, but that it's so easy. Am I nuts? Hardly. It's just that my curse is the curse of a perfect memory, and I remember piano lessons. My poor mother paid $600 in 1962 for a beautiful cherrywood spinet, and every week for two years I trucked off to Wilkins School of Music for a...
Expert One-on-One Oracle
Expert One-on-One Oracle
Tom Kyte is of a rare breed. To begin, he's technically expert in his subject (administration of and development of applications for Oracle database management systems). What's more (and what distinguishes him from the ranks of the super-competent), he is both able and willing to share his considerable store of wisdom with Oracle users via...
Stealing the Network: How to Own an Identity
Stealing the Network: How to Own an Identity
The first two books in this series Stealing the Network: How to Own the Box and Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the
...
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher, Second Edition
"A phenomenal resource for both extreme and not-so-extreme researchers. Great tips, clear explanations, and years of expertise distilled into 250 pages of clear, engaging text. This book should be on every searcher's desk."  —Mary Ellen Bates, coauthor, Researching Online for Dummies

The
...
The Book of VMware: The Complete Guide to VMware Workstation
The Book of VMware: The Complete Guide to VMware Workstation

There's only so much you can do by multitasking applications. Frequently, you just need another computer for testing software, trying out network configurations, or doing any of a dozen things that engineers and administrators need to do. VMware allows you to run several virtual machines on one physical computer, each completely...

The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Managing NFS and NIS, 2nd Edition
Managing NFS and NIS, 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.
Managing NFS and NIS, in a new edition based on Solaris 8,
...
IT Administrator's Top Ten Introductory Scripts for Windows (Administrator's Advantage Series)
IT Administrator's Top Ten Introductory Scripts for Windows (Administrator's Advantage Series)
A key problem with Microsoft Windows is that its friendly user interface can get in the way of efficient system administration. There's no easy way, for example, to use the graphical administration tools to determine which of your users have passwords that will soon expire. The answers to such problems of administration come in the form of scripts...
Web Development Solutions: Ajax, APIs, Libraries, and Hosted Services Made Easy
Web Development Solutions: Ajax, APIs, Libraries, and Hosted Services Made Easy
As a web user, you'll no doubt have noticed some of the breathtaking applications available in today's modern web, such as Google Maps and Flickrdesktop applications than the old style web sites you are used to. You've probably also wished that you could create such things, and then thought "nahhh, I'd need to know a lot of complicated code to...
unlimited object storage image
Result Page: 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy