Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Python
Programming Python

As Python's creator. I'd like to say a few words about its origins, adding a bit of personal philosophy.

Over six years ago. in December 1989; I was looking for a "hobby" programming project that would keep me occupied during the week around Christmas. My office (a government-run research lab in Amsterdam)
...

Black & Decker The Complete Guide to Sheds, 3rd Edition: Design & Build a Shed: - Complete Plans - Step-by-Step How-To (Black & Decker Complete Guide)
Black & Decker The Complete Guide to Sheds, 3rd Edition: Design & Build a Shed: - Complete Plans - Step-by-Step How-To (Black & Decker Complete Guide)

Black & Decker The Complete Guide to Sheds has the perfect plan for anyone who is building his or her own tool shed, habitable shed, and many more.

The most popular plans from previous editions are preserved, from small garage-style sheds with overhead doors, to kit sheds, to...

Netduino Home Automation Projects
Netduino Home Automation Projects

With this book you could have the home of tomorrow, literally tomorrow. Its totally practical approach is perfect for the hobbyist who wants to use Netduino to automate their home. Full of fun projects and clear instructions.

Overview

  • Automate your house using a Netduino and a bunch of common...
Designing Interactions
Designing Interactions
Digital technology has changed the way we interact with everything from the games we play to the tools we use at work. Designers of digital technology products no longer regard their job as designing a physical object—beautiful or utilitarian—but as designing our interactions with it. In Designing Interactions,...
Koi For Dummies
Koi For Dummies
Welcome to Koi For Dummies, a book designed for two purposes — to tell you about the beautiful fish known as koi and to make koi-keeping so simple you’ll wonder why you didn’t pick up this hobby eons ago.

What’s so much fun about koi? They’re gorgeous fish, and they’ve been selectively bred for more
...
Fuzzing: Brute Force Vulnerability Discovery
Fuzzing: Brute Force Vulnerability Discovery
The concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered...
Absolute Beginner's Guide to Building Robots
Absolute Beginner's Guide to Building Robots

Finally, a robots book for people who don't know the first thing about robotics! Absolute Beginner's Guide to Robots is well-written, inviting, and action-packed, with engaging ideas and fascinating factoids about robots and robot-related arts and sciences. You are led gently into the...

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Boring, boring, boring. Isn’t this what immediately comes to mind when one sees books on foundational concepts of information security? Monotonous coverage of theory, dry details of history, brief yet inadequate coverage of every topic known to man, even though you know that you’ll never be hired by the NSA as a...

Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)
Greatest Guide to Photography: Because It's More Than Pushing the Button (Greatest Guides)

Photography tips and advice to help you... + add wow to your images with simple, little-known techniques that change a good shot into a great shot + get pin-sharp, perfectly composed & correctly exposed images, time and time again + choose the best camera and identify only those essential accessories + take stunning portraits of your...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

Professional Ajax (Programmer to Programmer)
Professional Ajax (Programmer to Programmer)
Combining tried-and-true CSS, XML, and JavaScript™ technologies, Ajax provides web developers with the ability to create more sophisticated and responsive user interfaces and break free from the "click-and-wait" standard that has dominated the web since its introduction.

This book discusses the range of request brokers...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy