|
|
|
|
Raspberry Pi 3 Projects for Java Programmers
Learn the art of building enticing projects by unleashing the potential of Raspberry Pi 3 using Java
About This Book
-
Explore the small yet powerful mini computer in order to run java applications
-
Leverage Java libraries to build exciting projects on home automation, IoT, and Robotics by...
| | The New Shop Class: Getting Started with 3D Printing, Arduino, and Wearable Tech
The New Shop Class connects the worlds of the maker and hacker with that of the scientist and engineer. If you are a parent or educator or a budding maker yourself, and you feel overwhelmed with all of the possible technologies, this book will get you started with clear discussions of what open source technologies like 3D printers,... | | Getting Started with Flex 4
Discover what's possible with the latest version of Flash Builder and Flex. This hands-on guide helps you dive into the Adobe Flash Platform: through a series of quick step-by-step tutorials, you'll learn the process of building, debugging, and deploying a complete Rich Internet Application with Flex 4. Each... |
|
Data Analysis with Python: A Modern Approach
Learn a modern approach to data analysis using Python to harness the power of programming and AI across your data. Detailed case studies bring this modern approach to life across visual data, social media, graph algorithms, and time series analysis.
Key Features
-
Bridge your data analysis...
| | | | Digital Evidence and Computer Crime, Second EditionDigital evidence--evidence that is stored on or transmitted by computers--can play a major role in a wide range of crimes, including homicide, rape, abduction, child abuse, solicitation of minors, child pornography, stalking, harassment, fraud, theft, drug trafficking, computer intrusions, espionage, and terrorism.
Though an... |
|
|
| | Perimeter SecurityPerimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource... | | |
|
|
Result Page: 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 260 |