Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Anatomy of a Robot (TAB Robotics)
Anatomy of a Robot (TAB Robotics)
This work looks under the hood of all robotic projects, stimulating teachers, students, and hobbyists to learn more about the gamut of areas associated with control systems and robotics. It offers a unique presentation in providing both theory and philosophy in a technical yet entertaining way.

UNDER THE HOOD OF A
...
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries
Curious Folks Ask: 162 Real Answers on Amazing Inventions, Fascinating Products, and Medical Mysteries

“Dr. Seethaler has written an excellent book for any interested student of science. She answers great questions about the world around us in this fascinating book. As a high school science teacher, I encounter many of these from my own students. I would highly recommend this book for anyone who has pondered...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Real World Microsoft Access Database Protection and Security
Real World Microsoft Access Database Protection and Security

Microsoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that...

MAKE: Electronics: Learning Through Discovery
MAKE: Electronics: Learning Through Discovery
Want to learn the fundamentals of electronics in a fun, hands-on way? With Make: Electronics, you'll start working on real projects as soon as you crack open the book. Explore all of the key components and essential principles through a series of fascinating experiments. You'll build the circuits first, then learn the...
Hacking BlackBerry: ExtremeTech
Hacking BlackBerry: ExtremeTech
Here's an even better way to get your BlackBerry fix

Admit it. You're addicted to your BlackBerry. That's okay. Most usersare, and this book is just going to make it worse. Now you'll discover how to use your BlackBerry to retrieve documents, weatherforecasts, and Web infor-mation; use it as a wordprocessor or...

Adhesion in Microelectronics (Adhesion and Adhesives: Fundamental and Applied Aspects)
Adhesion in Microelectronics (Adhesion and Adhesives: Fundamental and Applied Aspects)

This comprehensive book will provide both fundamental and applied aspects of adhesion pertaining to microelectronics in a single and easily accessible source. Among the topics to be covered include;

  • Various theories or mechanisms of adhesion
  • Surface (physical or chemical) characterization of materials as it...
Hacking: The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition
Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Rather than merely showing how to run existing exploits,...

Hacking GPS (ExtremeTech)
Hacking GPS (ExtremeTech)
You'll get lost in this book, but nowhere else

Your GPS is a really cool toy, but what if you could make it even cooler? What if you could build and hook up data cables, modify your iPAQ cradle to take a GPS connection, tweak the firmware, hook up to your PC without expensive software, use GPS data in a hundred creative ways, even solar-power...

The Code Book: How to Make It, Break It, Hack It, Crack It
The Code Book: How to Make It, Break It, Hack It, Crack It

It’s known as the science of secrecy. Cryptography: the encoding and decoding of private information. And it is history’s most fascinating story of intrigue and cunning. From Julius Caesar and his Caesar Cipher to the code used by Mary Queen of Scots and her conspiracy to the use of the Engima machine during the Second World War,...

Tika in Action
Tika in Action

Summary

Tika in Action is a hands-on guide to content mining with Apache Tika. The book's many examples and case studies offer real-world experience from domains ranging from search engines to digital asset management and scientific data processing.

About the Technology

Tika is an...

Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Python Machine Learning Case Studies: Five Case Studies for the Data Scientist
Embrace machine learning approaches and Python to enable automatic rendering of rich insights and solve business problems. The book uses a hands-on case study-based approach to crack real-world applications to which machine learning concepts can be applied. These smarter machines will enable your business processes to achieve efficiencies on...
Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy