Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...
The Essential Family Guide to Caring for Older People
No one wants to think about getting older. It's true. At any age, when things are moving along normally day to day and everyone seems fit and well, there seems no reason to think about future problems that your friends and relatives might (and probably will) come across as they age. In fact, it might even seem a little morbid to...
Blockchain Basics: A Non-Technical Introduction in 25 Steps
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code, or computer science jargon are used. No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.
Building Embedded Linux Systems There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
Handbook of Modern Sensors: Physics, Designs, and Applications
Seven years have passed since the publication of the previous edition of this book.
During that time, sensor technologies have made a remarkable leap forward. The
sensitivity of the sensors became higher, the dimensions became smaller, the selectivity
became better, and the prices became lower. What have not changed are the...
|Result Page: 80 79 78 77 76 75 74 73 72 71 |