|
|
|
|
Bad to the Bone: Crafting Electronics Systems with Beaglebone and BeagleBone Black
This comprehensive book provides detailed materials for both novice and experienced programmers using all BeagleBone variants which host a powerful 32-bit, super-scalar TI Sitara ARM Cortex A8 processor. Authored by Steven F. Barrett and Jason Kridner, a seasoned ECE educator along with the founder of Beagleboard.org, respectively, the work... | | Windows 8 eLearning Kit For Dummies
Use Windows 8 without worry with this complete learning kit
If you want to master Windows 8, this value-packed eLearning kit is essential to your learning process. A complete Microsoft Windows 8 course, it includes a full-color printed book and an interactive eLearning course on CD. Each lesson opens with an introduction to... | | Rootkits: Subverting the Windows KernelRootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James... |
|
|
Applications of Nonverbal CommunicationEach and every day, in every social interaction, we communicate our feelings, attitudes, thoughts, and concerns nonverbally. Nonverbal communication is used to convey power and status, it is used to express love and intimacy, it is used to communicate agreement, to establish rapport, and to regulate the flow of communication. Nonverbal... | | Java Programming for Engineers (Mechanical Engineering Series (Boca Raton, Fla.).)As professors at Minnesota State University, the authors developed this book after realizing the need for a Java programming book specifically intended for engineering students. Java Programming for Engineers offers basic programming skills that can be applied in the engineering field. The tutorial uses the personal computer as a development... | | Cross Site Scripting Attacks: Xss Exploits and DefenseCross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they... |
|
| | Prokaryotic Symbionts in Plants (Microbiology Monographs)Endophytic prokaryotes can invade the tissue of the host plant without triggering defense reactions or disease symptoms. Instead, they promote the growth of the host plant due to their ability to fix atmospheric dinitrogen and/or to produce plant growth-promoting substances.
This Microbiology Monographs volume presents... | | Beginning WF: Windows Workflow in .NET 4.0 (Expert's Voice in .Net)
Windows Workflow Foundation is a ground-breaking addition to the core of the .NET Framework that allows you to orchestrate human and system interactions as a series of workflows that can be easily mapped, analyzed, adjusted, and implemented.
As business problems become more complex, the need for a workflow-based solution has never... |
|
|
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |