Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Python Robotics Projects: Build smart and collaborative robots using Python
Python Robotics Projects: Build smart and collaborative robots using Python

Leverage the power of Python to build DIY robotic projects

Key Features

  • Design, build, and stimulate collaborative robots
  • Build high-end robotics projects such as a customized personal Jarvis
  • Leverage the power of Python and ROS for DIY robotic...
Handbook of Modern Sensors: Physics, Designs, and Applications
Handbook of Modern Sensors: Physics, Designs, and Applications
Seven years have passed since the publication of the previous edition of this book. During that time, sensor technologies have made a remarkable leap forward. The sensitivity of the sensors became higher, the dimensions became smaller, the selectivity became better, and the prices became lower. What have not changed are the...
Android Application Security Essentials
Android Application Security Essentials

Security has been a bit of a hot topic with Android so this guide is a timely way to ensure your apps are safe. Includes everything from Android security architecture to safeguarding mobile payments.

Overview

  • Understand Android security from kernel to the application layer
  • Protect...
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)
Mike Meyers' CompTIA Security+ Certification Guide, Second Edition (Exam SY0-501)

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

...

The Book of Ruby: A Hands-On Guide for the Adventurous
The Book of Ruby: A Hands-On Guide for the Adventurous

Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.

...

Encyclopedia of Cybercrime
Encyclopedia of Cybercrime
The first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime

There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and
...
Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)
Ruby on Rails Tutorial: Learn Web Development with Rails (2nd Edition)

Ruby on Rails™ Tutorial by Michael Hartl has become a must-read for developers learning how to build Rails apps.”

Peter Cooper, Editor of Ruby Inside

 

Using Rails, developers can build...

Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits
The New Commodity Trading Guide: Breakthrough Strategies for Capturing Market Profits

“I’ve been trading stocks and commodities for more than 30 years, and I’ve read any number of how-to books, but George Kleinman’s The New Commodity Trading Guide is as clear, precise, and useful as any book I’ve come across during my career. I cannot recommend it strongly enough, if...

Windows Admin Scripting Little Black Book, Second Edition
Windows Admin Scripting Little Black Book, Second Edition
This book shows Windows XP and 2003 users and administrators how to perform Windows management and administrative tasks using powerful scripts for just about every important task imaginable.

Windows Admin Scripting Little Black Book, 2nd Edition, shows Windows XP and 2003 users and administrators how to perform Windows management...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Result Page: 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy