Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)
Model-Based Design for Embedded Systems (Computational Analysis, Synthesis, and Design of Dynamic Systems)

The demands of increasingly complex embedded systems and associated performance computations have resulted in the development of heterogeneous computing architectures that often integrate several types of processors, analog and digital electronic components, and mechanical and optical components—all on a single chip. As a result, now the...

Mastering Redmine
Mastering Redmine

Redmine is an open source gem for project management, and this book shows you how to exploit its features to the max. Written as a practical tutorial, it's also the perfect reference guide to have by your side.

Overview

  • Use Redmine in the most effective manner and learn to master it.
  • ...
Dependability of Self-Optimizing Mechatronic Systems (Lecture Notes in Mechanical Engineering)
Dependability of Self-Optimizing Mechatronic Systems (Lecture Notes in Mechanical Engineering)

Intelligent technical systems, which combine mechanical, electrical and software engineering with methods from control engineering and advanced mathematics, go far beyond the state of the art in mechatronics and open up fascinating perspectives. Among these systems are so-called self-optimizing systems, which are able to adapt their behavior...

Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Beginning Joomla!, Second Edition (Beginning from Novice to Professional)
Joomla!, exclamation point and all, is one of the most searched–for and hired–for open source content management systems in the world. Since 2007, the combination of Joomla! and Dan Rahmel’s bestselling Beginning Joomla!, From Novice to Professional have made it so that all you have to do is read a single...
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Welcome to A Bug Hunter’s Diary. This book describes the life cycles of seven interesting, real-life software security vulnerabilities I found over the past several years. Each chapter focuses on one bug. I’ll explain how I found the bug, the steps I took to exploit it, and how the vendor...
Artificial Organic Networks: Artificial Intelligence Based on Carbon Networks
Artificial Organic Networks: Artificial Intelligence Based on Carbon Networks

This monograph describes the synthesis and use of biologically-inspired artificial hydrocarbon networks (AHNs) for approximation models associated with machine learning and a novel computational algorithm with which to exploit them. The reader is first introduced to various kinds of algorithms designed to deal with approximation problems and...

WebGL Game Development
WebGL Game Development

WebGL is the standard for rendering 3D graphics in a browser using JavaScript. This book will teach you to exploit the full potential of WebGL in game development by rendering complex 3D objects. The essential tutorial.

Overview

  • Load and render complex 3D objects in WebGL using JavaScript
  • ...
RF Mems Circuit Design for Wireless Communications
RF Mems Circuit Design for Wireless Communications
This book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable...
3D Game Development with Microsoft Silverlight 3: Beginner's Guide
3D Game Development with Microsoft Silverlight 3: Beginner's Guide
Microsoft Silverlight is a programmable web browser plug-in that enables the animation, vector graphics, and audio-video playback features that characterize Rich Internet Applications. Silverlight is a great (and growing) RIA platform and games are the next level to exploit in it. But it doesn't offer 3D capabilities out of the box and integrating...
Creative Photoshop: Digital Illustration and Art Techniques, covering Photoshop CS3 (Digital Workflow)
Creative Photoshop: Digital Illustration and Art Techniques, covering Photoshop CS3 (Digital Workflow)
Dereks edge is that he wont stand still. He has a knack for finding new corners of the program to exploit and innovative ways of doing so. Hes pushed the boundaries not only for his own art but also for thousands of up and coming artists who also want to create onscreen the visions they have in their minds. If youve bought this book, youre about to...
Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy