Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)
The Annotated Build-It-Yourself Science Laboratory: Build Over 200 Pieces of Science Equipment! (Make)

In this book, you will learn how to make some amazing things: a carbon arc furnace, cloud chamber, mechanical stroboscope, radiometer, optical micrometer, electromagnet, microtome, spectroscope, and so many others. You will blow glass, catch bugs, and cut the ends off of power cords. You will learn how acids and alkalis taste, what lands of...

Anonymous Communication Networks: Protecting Privacy on the Web
Anonymous Communication Networks: Protecting Privacy on the Web

In today’s interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.

Addressing the demand for authoritative information on
...

Python Data Analysis
Python Data Analysis

Learn how to apply powerful data analysis techniques with popular open source Python modules

About This Book

  • Learn how to find, manipulate, and analyze data using Python
  • Perform advanced, high performance linear algebra and mathematical calculations with clean and efficient Python...
Cloud Connectivity and Embedded Sensory Systems
Cloud Connectivity and Embedded Sensory Systems

Sensor networks are meant to create awareness in space and time. They may be measuring the presence of an object or a condition, characterizing an object stream or a situational pattern, or even detect abnormalities that are to occur. This book provides new theory on the design of wireless sensor networks, based on concepts developed for...

Mastering Prezi for Business Presentations
Mastering Prezi for Business Presentations
If you've discovered Prezi in the last few years or even very recently, you have joined part of an interesting movement that's rapidly changing how ideas are shared. If you're reading this now then there's no doubt in our minds you're completely sold on the fact that business presentations need to change....
Hacking Exposed 7: Network Security Secrets and Solutions
Hacking Exposed 7: Network Security Secrets and Solutions

The latest tactics for thwarting digital attacks

“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the...

Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Practical Cyber Forensics: An Incident-Based Approach to Forensic Investigations
Become an effective cyber forensics investigator and gain a collection of practical, efficient techniques to get the job done. Diving straight into a discussion of anti-forensic techniques, this book shows you the many ways to effectively detect them. Now that you know what you are looking for, you’ll shift your focus to...
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data

Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The...

Cloud Computing and Software Services: Theory and Techniques
Cloud Computing and Software Services: Theory and Techniques

Thanks to its inherent resilience to failure and the increasing availability of open-source cloud infrastructure software and virtualization software stacks, services delivered from the cloud have expanded past web applications to include storage, raw computing, and access to specialized services. The possibility of satisfying maintenance and...

Android Recipes: A Problem-Solution Approach
Android Recipes: A Problem-Solution Approach

Android is hot, and many people are developing Android applications (apps for short). Perhaps you would also like to develop apps, but are unsure about how to get started. Although you could study Google’s online Android Developer’s Guide (http://developer.android.com/guide/index.html) to acquire the needed knowledge, you...

Databases in Networked Information Systems: 7th International Workshop, DNIS 2011
Databases in Networked Information Systems: 7th International Workshop, DNIS 2011

Large-scale information systems in public utility services depend on computing infrastructure. Many research efforts are being made in related areas, such as cloud computing, sensor networks, mobile computing, high-level user interfaces and information accesses by Web users. Government agencies in many countries plan to launch...

unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy