Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black

This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work...

Windows 8 eLearning Kit For Dummies
Windows 8 eLearning Kit For Dummies

Use Windows 8 without worry with this complete learning kit

If you want to master Windows 8, this value-packed eLearning kit is essential to your learning process. A complete Microsoft Windows 8 course, it includes a full-color printed book and an interactive eLearning course on CD. Each lesson opens with an introduction to...

Rootkits: Subverting the Windows Kernel
Rootkits: Subverting the Windows Kernel

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James...

Financial Modelling in Python (The Wiley Finance Series)
Financial Modelling in Python (The Wiley Finance Series)

"Fletcher and Gardner have created a comprehensive resource that will be of interest not only to those working in the field of finance, but also to those using numerical methods in other fields such as engineering, physics, and actuarial mathematics. By showing how to combine the high-level elegance, accessibility, and flexibility of...

Windows Server 2012 Hyper-V Cookbook
Windows Server 2012 Hyper-V Cookbook

Virtualization has proved that it can help organizations to reduce costs, and the Private Cloud has created a revolution in the way we manage and control our servers with centralization and elasticity. The new Windows Server 2012 Hyper-V release from Microsoft comes with a myriad of improvements in areas such as mobility, high availability...

Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals
Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS projectfrom needs definition to deployment considerations. Implementation...
Applications of Nonverbal Communication
Applications of Nonverbal Communication
Each and every day, in every social interaction, we communicate our feelings, attitudes, thoughts, and concerns nonverbally. Nonverbal communication is used to convey power and status, it is used to express love and intimacy, it is used to communicate agreement, to establish rapport, and to regulate the flow of communication. Nonverbal...
Java Programming for Engineers (Mechanical Engineering Series (Boca Raton, Fla.).)
Java Programming for Engineers (Mechanical Engineering Series (Boca Raton, Fla.).)

As professors at Minnesota State University, the authors developed this book after realizing the need for a Java programming book specifically intended for engineering students. Java Programming for Engineers offers basic programming skills that can be applied in the engineering field. The tutorial uses the personal computer as a development...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Enterprise Patterns and MDA: Building Better Software with Archetype Patterns and UML (Addison-Wesley Object Technology Series)
Enterprise Patterns and MDA: Building Better Software with Archetype Patterns and UML (Addison-Wesley Object Technology Series)
This book is a practical guide to applying Model Driven Architecture (MDA) and patterns in order to create business applications more easily. It provides you with a proven catalog of archetype patterns: high-value model components that can be easily incorporated into Unified Modeling Language (UML) models. Each archetype pattern allows you to...
Prokaryotic Symbionts in Plants (Microbiology Monographs)
Prokaryotic Symbionts in Plants (Microbiology Monographs)

Endophytic prokaryotes can invade the tissue of the host plant without triggering defense reactions or disease symptoms. Instead, they promote the growth of the host plant due to their ability to fix atmospheric dinitrogen and/or to produce plant growth-promoting substances.

This Microbiology Monographs volume presents...

Beginning WF: Windows Workflow in .NET 4.0 (Expert's Voice in .Net)
Beginning WF: Windows Workflow in .NET 4.0 (Expert's Voice in .Net)

Windows Workflow Foundation is a ground-breaking addition to the core of the .NET Framework that allows you to orchestrate human and system interactions as a series of workflows that can be easily mapped, analyzed, adjusted, and implemented.

As business problems become more complex, the need for a workflow-based solution has never...

unlimited object storage image
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy