Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Web Scraping: Hands-on data scraping and crawling using PyQT, Selnium, HTML and Python, 2nd Edition
Python Web Scraping: Hands-on data scraping and crawling using PyQT, Selnium, HTML and Python, 2nd Edition

Successfully scrape data from any website with the power of Python 3.x

Key Features

  • A hands-on guide to web scraping using Python with solutions to real-world problems
  • Create a number of different web scrapers in Python to extract information
  • This book...
C for the Microprocessor Engineer
C for the Microprocessor Engineer
C for the Microprocessor Engineer is designed to introduce the reader to the use, problems and advantages of using C as the programming medium for embedded microprocessor systems. It can be used as a general stand-alone text in microprocessor technology, since only a limited background is expected in microprocessor hardware and...
Assembly Language Programming: ARM Cortex-M3
Assembly Language Programming: ARM Cortex-M3

ARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly optimized piece of software (as is often the case in the world of embedded systems) it...

Real-Time Systems and Programming Languages: Ada, Real-Time Java and C/Real-Time POSIX (4th Edition) (International Computer Science Series)
Real-Time Systems and Programming Languages: Ada, Real-Time Java and C/Real-Time POSIX (4th Edition) (International Computer Science Series)

How do real-time systems differ from normal information systems? Which languages are best for implementing different real-time systems?

The fourth edition of this best-selling text on real-time systems answers these and other questions. It provides an in-depth analysis of the requirements for designing and
...

A Practical Introduction to Enterprise Network and Security Management
A Practical Introduction to Enterprise Network and Security Management

Computer networking and cybersecurity are challenging subjects, partly because of the constant rise and fall of related technologies and IT paradigms. As the title implies, much focus of this book is on providing the audience with practical, as well as, theoretical knowledge necessary to build a solid ground for a successful...

Multicore DSP: From Algorithms to Real-time Implementation on the TMS320C66x SoC
Multicore DSP: From Algorithms to Real-time Implementation on the TMS320C66x SoC

The only book to offer special coverage of the fundamentals of multicore DSP for implementation on the TMS320C66xx SoC

This unique book provides readers with an understanding of the TMS320C66xx SoC as well as its constraints. It offers critical analysis of each element, which not only broadens their knowledge of...

Java 8 Recipes
Java 8 Recipes

Java 8 Recipes offers solutions to common programming problems encountered while developing Java-based applications. Fully updated with the newest features and techniques available, Java 8 Recipes provides code examples involving Lambdas, embedded scripting with Nashorn, the new date-time API, stream support, functional...

Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)
Introduction to Embedded Systems: Using ANSI C and the Arduino Development Environment (Synthesis Lectures on Digital Circuits and Systems)

Many electrical and computer engineering projects involve some kind of embedded system in which a microcontroller sits at the center as the primary source of control.

The recently-developed Arduino development platform includes an inexpensive hardware development board hosting an eight-bit ATMEL ATmega-family processor...

From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems

When creating real-time and embedded (RTE) systems, there is no room for error. The nature of the final product demands that systems be powerful, efficient, and highly reliable. The constraints of processor and memory resources add to this challenge. Sophisticated developers rely on design patterns—proven solutions to...

Introduction to Embedded Systems: Using Microcontrollers and the MSP430
Introduction to Embedded Systems: Using Microcontrollers and the MSP430

This textbook serves as an introduction to the subject of embedded systems design, using microcontrollers as core components.  It develops concepts from the ground up, covering the development of embedded systems technology, architectural and organizational aspects of controllers and systems, processor models, and peripheral devices....

Software Requirements (3rd Edition) (Developer Best Practices)
Software Requirements (3rd Edition) (Developer Best Practices)

Now in its third edition, this classic guide to software requirements engineering has been fully updated with new topics, examples, and guidance. Two leaders in the requirements community have teamed up to deliver a contemporary set of practices covering the full range of requirements development and management activities on software...

Result Page: 62 61 60 59 58 57 56 55 54 53 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy