Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intel Edison Projects: Build exciting IoT projects with Intel Edison
Intel Edison Projects: Build exciting IoT projects with Intel Edison

Build powerful Robots and IoT solutions using Intel Edison

About This Book

  • Learn to build advanced level robots with Intel Edison and Arduino
  • Efficiently build and program home automation and IoT projects with Intel Edison
  • Master the skills of creating...
From Hacking to Report Writing: An Introduction to Security and Penetration Testing
From Hacking to Report Writing: An Introduction to Security and Penetration Testing

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...

Design of Energy-Efficient Application-Specific Instruction Set Processors
Design of Energy-Efficient Application-Specific Instruction Set Processors
After a brief introduction to low-power VLSI design, the design space of ASIP instruction set architectures (ISAs) is introduced with a special focus on important features for digital signal processing. Based on the degrees of freedom offered by this design space, a consistent ASIP design flow is proposed: this design flow starts with a given...
Microsoft® Mobile Development Handbook
Microsoft® Mobile Development Handbook
Experienced developers get proven techniques, real-world insights, and extensive code samples in Microsoft Visual C# to help deliver access to informationanywhere, on any device. Developers need to respond with more than simple adaptations of the user interfacethey need to implement mobile solutions for most of their applications.

...
Bootstrap Yourself with Linux-USB Stack: Design, Develop, Debug, and Validate Embedded USB Systems
Bootstrap Yourself with Linux-USB Stack: Design, Develop, Debug, and Validate Embedded USB Systems

Before starting a new task, you generally do research so you can avoid mistakes. In the computer realm, bootstrap sessions provide a head start and help you minimize mistakes and surprises. As an example, to design a protocol stack, build a bootstrap session so you can understand the protocol specification and the system on which it...

Wireless Sensor Network Designs
Wireless Sensor Network Designs
Wireless Sensors are small, cheap, low maintenance and will revolutionize wireless communications.

’Wireless sensor networks’ is a rapidly growing discipline with new technologies emerging, new applications being developed and standards being finalized. Sensors and actuators allow for entirely new kinds of...

USB Mass Storage: Designing and Programming Devices and Embedded Hosts
USB Mass Storage: Designing and Programming Devices and Embedded Hosts
A mass-storage device can provide access to data for just about any purpose. Every time you load an application or save a file on a PC, you’re using a mass-storage device. A computer’s hard drive is a mass-storage device, as are flash, CD, and DVD drives. Devices with dedicated functions—data loggers, robots, and other embedded...
How to Cheat at Securing SQL Server 2005
How to Cheat at Securing SQL Server 2005
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005.

SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions and a vexing number of new features. How to
...
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded Systems Designers (Embedded Technology)
Wireless networking is poised to have a massive impact on communications, and the 802.11 standard is to wireless networking what Ethernet is to wired networking. There are already over 50 million devices using the dominant IEEE 802.11 (essentially wireless Ethernet) standard, with astronomical growth predicted over the next 10 years. New...
Designing Embedded Hardware
Designing Embedded Hardware
Embedded computer systems literally surround us: they're in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.

Along with the growing list of devices for which embedded computer systems are appropriate,
...
Analyzing Computer Systems Performance: With Perl: PDQ
Analyzing Computer Systems Performance: With Perl: PDQ

Analyzing computer system performance is often regarded by most system administrators, IT professionals and software engineers as a black art that is too time consuming to learn and apply. Finally, this book by acclaimed performance analyst Dr. Neil Gunther makes this subject understandable and applicable through programmatic examples. The means...

Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications
Emerging Technologies for Semantic Work Environments: Techniques, Methods, and Applications
Todays work is characterized by a high degree of innovation and thus demands a thorough overview of relevant knowledge in the world and in organizations. Semantic Work Environments support the work of the user by collecting knowledge about needs and providing processed and improved knowledge to be integrated into work.

Emerging...

unlimited object storage image
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy