Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
Andean Cocaine: The Making of a Global Drug
Andean Cocaine: The Making of a Global Drug

Illuminating a hidden and fascinating chapter in the history of globalization, Paul Gootenberg chronicles the rise of one of the most spectacular and now illegal Latin American exports: cocaine.

Gootenberg traces cocaine's history from its origins as a medical commodity in the nineteenth century to its repression during
...

Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)
Vaccinia Virus and Poxvirology: Methods and Protocols (Methods in Molecular Biology)

A comprehensive collection of cutting-edge methods to study and work with the vaccinia virus and other poxvirus gene transcriptions. These readily reproducible techniques can be used for the construction and characterization of recombinant viruses; for the study of poxvirus gene transcription and DNA replication; for the investigation of the...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Jump Start Git
Jump Start Git

Get a Jump Start on version control with Git today!

Most engineers we meet prefer Git over other distributed version control systems.

These systems let you store different versions of project files and directories, so you can roll back to an earlier one if something goes wrong. And since they're...

The Optics of Life: A Biologist's Guide to Light in Nature
The Optics of Life: A Biologist's Guide to Light in Nature

Optics--a field of physics focusing on the study of light--is also central to many areas of biology, including vision, ecology, botany, animal behavior, neurobiology, and molecular biology. The Optics of Life introduces the fundamentals of optics to biologists and nonphysicists, giving them the tools they need to successfully incorporate...

Real-Life X-Files: Investigating the Paranormal
Real-Life X-Files: Investigating the Paranormal
"Whoever said that the truth is both stranger and more entertaining than fiction describes this book exactly." -- Skeptical Inquirer

Interest in the paranormal is at an all-time high. Ghosts, UFOs, psychic power and other unexplained phenomena are endlessly fascinating for us. People often seem to accept of
...
DHCP Handbook, The (2nd Edition)
DHCP Handbook, The (2nd Edition)
The Dynamic Host Configuration Protocol (DHCP) provides a way to automate and manage the network configurations of devices that use the TCP/IP protocol suite. Without DHCP, network administrators must manually enter in IP addresses for each computer and network device and then manually change that address each time the device is moved to a...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy