Home | Amazing | Today | Tags | Publishers | Years | Search 
Solar System Astrophysics: Planetary Atmospheres and the Outer Solar System (Astronomy and Astrophysics Library)
Solar System Astrophysics: Planetary Atmospheres and the Outer Solar System (Astronomy and Astrophysics Library)

The second edition of Solar System Astrophysics: Planetary Atmospheres and the Outer Solar System provides a timely update of our knowledge of planetary atmospheres and of the bodies of the outer solar system and their analogs in other planetary systems. This volume begins with an expanded treatment of the physics, chemistry, and...

Intel Galileo Essentials
Intel Galileo Essentials

Leverage the power of Intel Galileo to construct amazingly simple, yet impressive projects

About This Book

  • Learn how to connect additional hardware to the Intel Galileo to easily create complex robots
  • Understand GPIO pins on the Galileo and how to use them
  • Control a DC...
Software Manual for the Elementary Functions (Prentice-Hall series in computational mathematics)
Software Manual for the Elementary Functions (Prentice-Hall series in computational mathematics)
This manual is intended to provide guidance towards the preparation and testing of elementary function subroutines for non-vector oriented digital computers. We believe it will be useful to systems programmers, teachers, students of numerical analysis, hobbyists and anyone else concerned or curious about how the elementary...
Ethnic American Cooking: Recipes for Living in a New World
Ethnic American Cooking: Recipes for Living in a New World

Ethnic American Cooking: Recipes for Living in a New World is much more than a cookbook. It contains recipes from almost every nationality or ethnicity residing in the US and includes a brief introduction to understanding how those recipes represent that group’s food culture. It...

Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing
Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing

Cyber crime is the biggest threat that every organization on the planet faces today! And it’s not just the organizations that are vulnerable. People too are at risk of being targeted by hackers.

Inside this book we aim to show you the importance of staying on top of this threat by learning how to hack. While it...

Python Playground: Geeky Projects for the Curious Programmer
Python Playground: Geeky Projects for the Curious Programmer

Python is a powerful programming language that’s easy to learn and fun to play with. But once you’ve gotten a handle on the basics, what do you do next?

Python Playground is a collection of imaginative programming projects that will inspire you to use Python to make art and music, build simulations of
...

Mastering Concurrency in Go
Mastering Concurrency in Go

Discover and harness Go's powerful concurrency features to develop and build fast, scalable network systems

About This Book

  • Explore the core syntaxes and language features that enable concurrency in Go
  • Understand when and where to use concurrency to keep data consistent and...
Web as History: Using Web Archives to Understand the Past and the Present
Web as History: Using Web Archives to Understand the Past and the Present
The World Wide Web has now been in use for more than 20 years. From early browsers to today’s principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe ‘if it’s not online, it doesn’t exist.’ While this statement is not...
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware
Learning Malware Analysis: Explore the concepts, tools, and techniques to analyze and investigate Windows malware

Understand malware analysis and its practical implementation

Key Features

  • Explore the key concepts of malware analysis and memory forensics using real-world examples
  • Learn the art of detecting, analyzing, and investigating malware threats
  • Understand...
Data Professionals at Work
Data Professionals at Work
Enjoy reading interviews with more than two dozen data professionals to see a picture of what it’s like to work in the industry managing and analyzing data, helping you to know what it takes to move from your current expertise into one of the fastest growing areas of technology today. Data is the hottest word of...
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development
Blockchain Quick Reference: A guide to exploring decentralized Blockchain application development

Understand the Blockchain revolution and get to grips with Ethereum, Hyperledger Fabric, and Corda.

Key Features

  • Resolve common challenges and problems faced in the Blockchain domain
  • Study architecture, concepts, terminologies, and Dapps
  • Make smart choices...
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy