Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Amazon Web Services for Mobile Developers: Building Apps with AWS
Amazon Web Services for Mobile Developers: Building Apps with AWS

A practical, real-world introduction to AWS tools and concepts

Amazon Web Services for Mobile Developers: Building Apps with AWS presents a professional view of cloud computing and AWS for experienced iOS/Android developers and technical/solution architects. Cloud computing is a rapidly expanding ecosystem, and...

Game Programming Using QT
Game Programming Using QT

A complete guide to designing and building fun games with Qt and Qt Quick 2 using associated toolsets

About This Book

  • Learn to create simple 2D to complex 3D graphics and games using all possible tools and widgets available for game development in Qt
  • Understand technologies such as QML,...
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)
Pattern-Oriented Software Architecture, Patterns for Resource Management (Wiley Software Patterns Series)

This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...

Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices
Analytics for the Internet of Things (IoT): Intelligent analytics for your intelligent devices

Break through the hype and learn how to extract actionable intelligence from the flood of IoT data

Key Features

  • Make better business decisions and acquire greater control of your IoT infrastructure
  • Learn techniques to solve unique problems associated with IoT and examine and analyze data...
Exploring C for Microcontrollers: A Hands on Approach
Exploring C for Microcontrollers: A Hands on Approach
The market is flooded with numbers of good books on Embedded Systems designed especially with the most popular MCS51 family. These books are traditional in nature i.e. they start with the routine architectural features of 8051, description of registers, ports, interrupts etc. Most of these things are already covered in the device data sheet and...
Data Compression: The Complete Reference
Data Compression: The Complete Reference
Giambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have...
Embedded Systems: Desktop Integration (Wordware Applications Library)
Embedded Systems: Desktop Integration (Wordware Applications Library)
In this book, we design a thermostat that interfaces to a host
system through RS-232, USB, and Ethernet. To make things fun,
the device layer and user applications have to run on Windows,
Linux, and FreeBSD. We build three prototype thermostats using
the BASIC Stamp, PIC Microcontroller, and PSOC Microcontroller.
We
...
Embedded Systems: Hardware, Design and Implementation
Embedded Systems: Hardware, Design and Implementation

Covers the significant embedded computing technologies—highlighting their applications in wireless communication and computing power

An embedded system is a computer system designed for specific control functions within a larger system—often with real-time computing constraints. It is embedded as part of a...

Statistics for Research (Wiley Series in Probability and Statistics)
Statistics for Research (Wiley Series in Probability and Statistics)
Praise for the Second Edition

"Statistics for Research has other fine qualities besides superior organization. The examples and the statistical methods are laid out with unusual clarity by the simple device of using special formats for each. The book was written with great care and is extremely user-friendly."—The...

Information Security Science: Measuring the Vulnerability to Data Compromises
Information Security Science: Measuring the Vulnerability to Data Compromises

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...

Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

Measurement Systems And Sensors
Measurement Systems And Sensors
One of the tendencies in measurement technology development is the development of measurement systems. By the measurement systems, we refer to a set of material and organizational resources, as well as programs for information processing, aggregated in order to obtain, transmit, and process measuring data, and to display and...
Result Page: 99 98 97 96 95 94 93 92 91 90 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy