|
|
|
|
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)
In this book, you will learn how to make some amazing things: a carbon arc furnace, cloud chamber, mechanical stroboscope, radiometer, optical micrometer, electromagnet, microtome, spectroscope, and so many others. You will blow glass, catch bugs, and cut the ends off of power cords. You will learn how acids and alkalis taste, what lands of... | | Anonymous Communication Networks: Protecting Privacy on the Web
In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.
Addressing the demand for authoritative information on... | | Python Data Analysis
Learn how to apply powerful data analysis techniques with popular open source Python modules
About This Book
-
Learn how to find, manipulate, and analyze data using Python
-
Perform advanced, high performance linear algebra and mathematical calculations with clean and efficient Python...
|
|
Cloud Connectivity and Embedded Sensory Systems
Sensor networks are meant to create awareness in space and time. They may be measuring the presence of an object or a condition, characterizing an object stream or a situational pattern, or even detect abnormalities that are to occur. This book provides new theory on the design of wireless sensor networks, based on concepts developed for... | | Mastering Prezi for Business Presentations
If you've discovered Prezi in the last few years or even very recently, you have joined
part of an interesting movement that's rapidly changing how ideas are shared. If
you're reading this now then there's no doubt in our minds you're completely sold
on the fact that business presentations need to change.... | | Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... |
|
|
|
|
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 |