Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things with Arduino Cookbook
Internet of Things with Arduino Cookbook

Key Features

  • This book offers key solutions and advice to address the hiccups faced when working on Arduino-based IoT projects in the real world
  • Take your existing skills and capabilities to the next level by building challenging IoT applications with ease.
  • Be the tech disruptor you always...
Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
Unless you are working at a very advanced level, this is the only SQL book you will ever need. The authors have taken the mystery out of complex queries and explained principles and techniques with such clarity that a "Mere Mortal" will indeed be empowered to perform the superhuman. Do not walk past this book!
Automotive Embedded Systems Handbook (Industrial Information Technology)
Automotive Embedded Systems Handbook (Industrial Information Technology)
Highlighting requirements, technologies, and business models, the Automotive Embedded Systems Handbook provides a comprehensive overview of existing and future automotive electronic systems. It presents state-of-the-art methodological and technical solutions in the areas of in-vehicle architectures, multipartner development...
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the letter,...

GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011

The fourth edition of the International Conference on Geospatial Semantics (GeoS 2011) was held in Brest, France, during May 12–13, 2011.

Geospatial semantics (GEOS) is an emerging research area in the domain of geographic information science. It aims at exploring strategies, computational methods, and tools to support...

Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
Algorithms and Computation: 11th International Conference, ISAAC 2000, Taipei, Taiwan
The papers in this volume were selected for presentation at the Eleventh Annual International Symposium on Algorithms and Computation (ISAAC 2000), held on 18{20 December, 2000 at the Institute of Information Science, Academia Sinica, Taipei, Taiwan. Previous meetings were held in Tokyo (1990), Taipei (1991), Nagoya (1992),...
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future
The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future

The Enterprise Resource Planning Decade: Lessons Learned and Issues for the Future presents an investigation into the rationale for ERP by raising key questions that managers should ask themselves prior to considering ERP, including processes that should be followed in planning when acquiring ERP.

It concentrates on the impact...

Legal Knowledge and Information Systems:  JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
Legal Knowledge and Information Systems: JURIX 2006: The Nineteenth Annual Conference - Volume 152 Frontiers in Artificial Intelligence and Applications
This volume contains the Proceedings of the Nineteenth JURIX Conference on Legal Knowledge and Information Systems (JURIX 2006), December 7th–9th, Université Pantheon Assas – Paris II, France. This year we hoped to put two new topics on the agenda: Artificial Intelligence in police and intelligence services and the impact of AI...
Astrophysical Lasers
Astrophysical Lasers
`A book of great educational value for graduate students and professional astronomers. ' Professor Dame Carole Jordan, University of Oxford

Progress in modern radio astronomy led to the discovery of space masers in the microwave range, and it became a powerful tool for studies of interstellar star-forming molecular
...
104 Number Theory Problems: From the Training of the USA IMO Team
104 Number Theory Problems: From the Training of the USA IMO Team
This challenging problem book by renowned US Olympiad coaches, mathematics teachers, and researchers develops a multitude of problem-solving skills needed to excel in mathematical contests and research in number theory. Offering inspiration and intellectual delight, the problems throughout the book encourage students to express their ideas,...
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
The Lanczos and Conjugate Gradient Algorithms: From Theory to Finite Precision Computations
"No present book comes near this one in the range and depth of treatment of these two extremely important methods—the Lanczos algorithm and the method of conjugate gradients." Chris Paige, School of Computer Science, McGill University.   The Lanczos and conjugate gradient (CG) algorithms are fascinating numerical...
Result Page: 24 23 22 21 20 19 18 17 16 15 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy