Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning BeagleBone Python Programming
Learning BeagleBone Python Programming

Unleash the potential of BeagleBone using Python

About This Book

  • Configure and customize your BeagleBone to seamlessly connect it to external hardware using Python
  • Learn to write programs that interface with the real world using GPIO ports
  • Clear and step-by-step examples,...
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information
Building a HIPAA-Compliant Cybersecurity Program: Using NIST 800-30 and CSF to Secure Protected Health Information

Use this book to learn how to conduct a timely and thorough Risk Analysis and Assessment documenting all risks to the confidentiality, integrity, and availability of electronic Protected Health Information (ePHI), which is a key component of the HIPAA Security Rule. The requirement is a focus area for the Department of Health and Human...

Digital Photography Pocket Guide, Third Edition (O'Reilly Digital Studio)
Digital Photography Pocket Guide, Third Edition (O'Reilly Digital Studio)

Even film diehards have a tough time resisting the instant gratification of the digital camera. Today's digital cameras are more affordable then ever before, and they deliver high quality images that are a snap to share. Plus, you can take risks with a digital camera you never would with a film camera. You waste nothing;...

Business Applications and Computational Intelligence
Business Applications and Computational Intelligence
Computational intelligence has a long history of applications to business - expert systems have been used for decision support in management, neural networks and fuzzy logic have been used in process control, a variety of techniques have been used in forecasting, and data mining has become a core component of customer relationship management in...
Pro Wicket (Expert's Voice in Java)
Pro Wicket (Expert's Voice in Java)

I'm glad we're having our first real Wicket book available now...It is more than just a how-to guide; Karthik goes through the effort of explaining alternatives and explains how things are done by Wicket instead of merely giving you the steps...

Implementing 802.1X Security Solutions for Wired and Wireless Networks
Implementing 802.1X Security Solutions for Wired and Wireless Networks
When deploying a wireless or wired network, you must ensure that proper security safeguards are put in place. An enterprise, for example, often has valuable resources stored inside databases that are attached to the network. Using passwords to access specific applications is usually not good enough to keep hackers from accessing the resources in an...
Cocoa Programming for Mac OS X For Dummies (Computer/Tech)
Cocoa Programming for Mac OS X For Dummies (Computer/Tech)
Cocoa programming is not only the favored development environment for Mac OS X, it’s also a primary tool for creating iPhone and iPod Touch software. That makes this a great time to learn Cocoa, and Cocoa Programming for Mac OS X For Dummies is the ideal place to start!

This book gives you a solid foundation in Cocoa and the...

Cisco Network Professional's Advanced Internetworking Guide
Cisco Network Professional's Advanced Internetworking Guide
Ideal for any IT professional who uses Cisco technologies on a daily basis, or anyone who is preparing for their Cisco Certified Network Professional (CCNP) certification.

The topics covered will be more in depth than other introductory-level books of similar topics, and will span from layer 2 technologies such as switching, STP,...

Electrical Conductive Adhesives with Nanotechnologies
Electrical Conductive Adhesives with Nanotechnologies

“Electrical Conductive Adhesives with Nanotechnologies” begins with an overview of electronic packaging and discusses the various adhesives options currently available, including lead-free solder and ECAs (Electrically Conductive Adhesives). The material presented focuses on the three ECA categories specifically, Isotropically...

Information Retrieval: Implementing and Evaluating Search Engines
Information Retrieval: Implementing and Evaluating Search Engines

An academic dynasty has come together to write an excellent textbook on information retrieval. Stefan Buttcher, Charles Clarke, and Gordon Cormack make up three generations of stellar information retrieval researchers with over fifty years of combined experience. Buttcher was Clarke's doctoral student, and Clarke was Cormack's...

Getting Started with Storm
Getting Started with Storm
If you’re reading this, it’s because you heard about Storm somehow, and you’re interested in better understanding what it does, how you can use it to solve various problems, and how it works.

This book will get you started with Storm in a very straightforward and easy way. The
...
Cancer Cell Signaling: Methods and Protocols (Methods in Molecular Biology)
Cancer Cell Signaling: Methods and Protocols (Methods in Molecular Biology)

Cells respond to environmental cues through a complex and dynamic network of signaling pathways that normally maintain a critical balance between cellular proliferation, differentiation, senescence, and death. One current research challenge is to identify those aberrations in signal transd- tion that directly contribute to a loss of this...

unlimited object storage image
Result Page: 83 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy