Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications
Building Arduino Projects for the Internet of Things: Experiments with Real-World Applications

Gain a strong foundation of Arduino-based device development, from which you can go in any direction according to your specific development needs and desires. You'll build Arduino-powered devices for everyday use, and then connect those devices to the Internet. 

You'll be introduced to the building...

Becoming an Exceptional Executive Coach: Use Your Knowledge, Experience, and Intuition to Help Leaders Excel
Becoming an Exceptional Executive Coach: Use Your Knowledge, Experience, and Intuition to Help Leaders Excel

Coaching is more than simply learning a process and set of skills. Exceptional coaches draw on their professional experience, knowledge of organizationally relevant topics, strong helping skills, coaching-specific competencies, and most important, their ability to use their own intuition in the service of the client. "Becoming an...

Communicate Effectively (The McGraw-Hill Professional Education Series)
Communicate Effectively (The McGraw-Hill Professional Education Series)

This hands-on, concise guide gives you 24 proven techniques for communicating clearly and managing conflicts. It features guidelines for everything from sharing information and gathering input from employees to handling disagreements to conducting results-driven meetings and presentations.

...
Raspberry Pi for Secret Agents - Second Edition
Raspberry Pi for Secret Agents - Second Edition

Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects

About This Book

  • Turn your Raspberry Pi into a multipurpose secret agent gadget for audio/video surveillance, Wi-Fi exploration, or playing pranks on your friends
  • Detect an intruder on camera...
Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
Beginning Apache Pig: Big Data Processing Made Easy
Beginning Apache Pig: Big Data Processing Made Easy
Learn to use Apache Pig to develop lightweight big data applications easily and quickly. This book shows you many optimization techniques and covers every context where Pig is used in big data analytics. Beginning Apache Pig shows you how Pig is easy to learn and requires relatively little time to develop big data...
Basic Security Testing with Kali Linux
Basic Security Testing with Kali Linux

With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems. Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their...

Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality
Competing with High Quality Data: Concepts, Tools, and Techniques for Building a Successful Approach to Data Quality

Create a competitive advantage with data quality

Data is rapidly becoming the powerhouse of industry, butlow-quality data can actually put a company at a disadvantage. Tobe used effectively, data must accurately reflect the real-worldscenario it represents, and it must be in a form that is usable andaccessible. Quality data...

Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)
Police Technology: 21st-Century Crime-Fighting Tools (Law Enforcement and Intelligence Gathering)

Computers have become vital for police work in the twenty-first century. Applications explored in this compelling volume include the capability of searching extensive, internationally synchronized criminal information databases; plotting crime incidents and patterns to anticipate and prevent recurrences; interrogating criminal suspects and...

Business Intelligence: Data Mining and Optimization for Decision Making
Business Intelligence: Data Mining and Optimization for Decision Making

Business intelligence is a broad category of applications andtechnologies for gathering, providing access to, and analyzing datafor the purpose of helping enterprise users make better businessdecisions. The term implies having a comprehensive knowledge of allfactors that affect a business, such as customers, competitors,business partners,...

Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy