Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Human-in-the-Loop Simulations: Methods and Practice
Human-in-the-Loop Simulations: Methods and Practice

Both the editors of this book were exposed to human-in-the-loop simulations while pursuing their doctoral degrees in the Center for Human-Machine Systems at Georgia Tech. In fact, S. Narayanan served as Ling Rothrock’s teaching assistant for the simulation course taught by Prof. Christine Mitchell. It has been over 15 years...

Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Programming Excel with VBA and .NET
Programming Excel with VBA and .NET

Why program Excel? For solving complex calculations and presenting results, Excel is amazingly complete with every imaginable feature already in place. But programming Excel isn't about adding new features as much as it's about combining existing features to solve particular problems. With a few modifications, you can transform...

Fundamentals of Structural Engineering
Fundamentals of Structural Engineering

Fundamentals of Structural Engineering provides a balanced, seamless treatment of both classic, analytic methods and contemporary, computer-based techniques for conceptualizing and designing a structure. The book?s principle goal is to foster an intuitive understanding of structural behavior based on problem solving experience for...

The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job

A landmark book that blazed light on one of the business world's dirtiest secrets, The Bully at Work exposed the destructive, silent epidemic of workplace bullying that devastates the lives, careers, and families of millions. In this completely updated new edition based on an updated survey of workplace issues, the authors explore...

Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Alfresco 3 Web Services
Alfresco 3 Web Services

Alfresco 3 is the leading open source enterprise content management system that offers powerful features for interacting with the content in its repository from outside the system. These include the support for the Content Management Interoperability Services (CMIS) implementation, reusable web scripts, and a Web Services API.

This...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy