Home | Amazing | Today | Tags | Publishers | Years | Search 
Arduino Internals
Arduino Internals

Let's investigate the inner-workings of your Arduino. It appears to be a simple machine, but it is not. Much effort has been invested to make it easy to learn and use. Unfortunately, these good intentions can mask some of the Arduino's underlying capabilities. You suspected that there was more, much more, under the simplistic...

Mac Kung Fu: Over 300 Tips, Tricks, Hints, and Hacks for OS X Lion (Pragmatic Programmers)
Mac Kung Fu: Over 300 Tips, Tricks, Hints, and Hacks for OS X Lion (Pragmatic Programmers)
Mac OS X Lion represents the pinnacle of software engineering. I confidently assert this as somebody who’s not only used every operating system on practically every type of computer but also written entire magazines and books about them.

Put simply, OS X “just works,” and like millions of others, I value
...
Pragmatic Guide to Sass
Pragmatic Guide to Sass
Wel come to the Pragmatic Guide to Sass. Sass (Syntactically Awes o me Style Sheets) enables you to do amazing things with your style sheets, helping you describe how HTML is laid out on a web page. Sass is an alternative way of writing CSS.

“What’s wrong with regular ol’
...
Enabling Programmable Self with HealthVault: An Accessible Personal Health Record
Enabling Programmable Self with HealthVault: An Accessible Personal Health Record
Microsoft HealthVault is the most prominent example of a personally controlled health record. With its open API, flexibility, and connections with multiple health care providers, it gives people interested in monitoring their own health an unprecedented opportunity to do their own research on their own data. This...
Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

HTML5 Hacks
HTML5 Hacks
HTML5 is the new catchall term for “the Web.” Like Ajax and Web 2.0 before, the term can cause confusion when used in different contexts. HTML5 is technically the fifth revision of the HTML markup language, but you will find the term being used to describe an umbrella of next-generation web technology...
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
Kinect Hacks: Tips & Tools for Motion and Pattern Detection
The way we interact with machines is always changing. As technology evolves, new ways of interacting with computers become available to us, one innovative breakthrough after the next. If we go back 10 years, RIM was just starting to implement phone capabilities into their line of Blackberry mobile devices. Now we...
Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Data-Driven Security: Analysis, Visualization and Dashboards
Data-Driven Security: Analysis, Visualization and Dashboards

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...

Effective Unit Testing: A guide for Java developers
Effective Unit Testing: A guide for Java developers

Summary

Effective Unit Testing is written to show how to write good tests—tests that are concise and to the point, expressive, useful, and maintainable. Inspired by Roy Osherove's bestselling The Art of Unit Testing, this book focuses on tools and practices specific to the Java world. It...

The Elements of Investing
The Elements of Investing

A timeless, easy-to-read guide on life-long investment principles that can help any investor succeed

The Elements of Investing has a single-minded goal: to teach the principles of investing in the same pared-to-bone manner that Professor William Strunk Jr. once taught composition to students at Harvard, using his...

Result Page: 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy