Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Fujifilm X-T1: 111 X-Pert Tips to Get the Most Out of Your Camera
The Fujifilm X-T1: 111 X-Pert Tips to Get the Most Out of Your Camera

In this book, popular Fuji Rumors "X-Pert Corner" columnist Rico Pfirstinger teaches about the little-known capabilities of the X-T1, which he's discovered through months of in-depth research and experimentation with the camera. After a brief overview of the camera's basic functions, Rico cuts to the chase and...

Itanium Architecture for Software Developers
Itanium Architecture for Software Developers
"Reading the Itanium Architecture for Software Developers book saved us days, maybe weeks on project development." -- Dong Wei, System Architect for Servers, Hewlett-Packard

Product Description
This unique description of the Intel® Itanium™ application architecture helps
...
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Take a practioner’s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture.  

You’ll review the architecture's central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE
...
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
Hacking the Cable Modem: What Cable Companies Don't Want You to Know
In the beginning there was dial-up, and it was slow; then came broadband in the form of cable, which redefined how we access the internet, share information, and communicate with each other online. Hacking the Cable Modem goes inside the device that makes Internet via cable possible and, along the way, reveals secrets of many popular cable...
LWUIT 1.1 for Java ME Developers
LWUIT 1.1 for Java ME Developers
Writing appealing cross-device applications today in Java ME is challenging as implementation differences in fonts, layout, and menus can make your application look and behave very differently on different devices. So far, the only way out has been low-level programming with its associated complexity.

The Lightweight UI Toolkit (LWUIT),
...
Computer Organization, Design, and Architecture, Fourth Edition
Computer Organization, Design, and Architecture, Fourth Edition

This book covers the organization, design, and architecture of computers. Architecture is the ‘‘art or science of building; a method or style of building,’’ according to Webster’s. A computer architect develops the functional and performance specifications for the various blocks of a computer system and...

Implementing Mobile TV, Second Edition
Implementing Mobile TV, Second Edition

Implement state-of-the-art Mobile TV networks with this comprehensive guide to the latest technologies and standards, including MediaFLO, ATSC Mobile DTV, and CMMB, the same technologies seeing large-scale rollouts today around the world. You not only gain deep insight into the maze of technologies, but also the principles of mobile...

Mainframe Basics for Security Professionals: Getting Started with RACF
Mainframe Basics for Security Professionals: Getting Started with RACF
Security—it comes in many forms in the IT world: physical security around a data center, user ID authentication when a transaction gets executed, access control against a database, audit records for anomaly detection. All these forms can be bought and paid for, yet, one element must be taught. That is, the human, the person who administers...
Processor Design: System-On-Chip Computing for ASICs and FPGAs
Processor Design: System-On-Chip Computing for ASICs and FPGAs
rocessor Design addresses the design of different types of embedded, firmware-programmable computation engines. Because the design and customization of embedded processors has become a mainstream task in the development of complex SoCs (Systems-on-Chip), ASIC and SoC designers must master the integration and development of processor...
Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54Gs hardware components, the different third-party firmware available and the differences between them, choosing the...
Embedded Systems Design Using the TI MSP430 Series (Embedded Technology)
Embedded Systems Design Using the TI MSP430 Series (Embedded Technology)

Learn about designing, programming, and developing with the popular new Texas Instruments family of microcontrollers, the MSP430 series with this new book from Chris Nagy. This product line is experiencing explosive growth due to its low-power consumption and powerful features, but very little design and application information is available...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy