Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Sensor Networks with Arduino and Raspberry Pi
Beginning Sensor Networks with Arduino and Raspberry Pi

Beginning Sensor Networks with Arduino and Raspberry Pi teaches you how to build sensor networks with Arduino, Raspberry Pi, and XBee radio modules, and even shows you how to turn your Raspberry Pi into a MySQL database server to store your sensor data!

First you'll learn about the different types of sensors and
...

Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

Trends in Functional Programming: Volume 5
Trends in Functional Programming: Volume 5
Covers all aspects of functional programming, both theoretical and practical, to provide a coherent overview of research's most recent developments. This book features: language design, proof and transformation, semantics and models, implementation, applications, type systems, parallelismand distribution, performance modelling and profiling,...
WCF 4.0 Multi-tier Services Development with LINQ to Entities
WCF 4.0 Multi-tier Services Development with LINQ to Entities

WCF is the Microsoft model for building services, whereas LINQ to Entities is the Microsoft ORM for accessing underlying data storage. Want to learn both? You would normally have to dig through huge reference tomes-so wouldn't you agree that a simple-to-follow practical tutorial on WCF and LINQ to Entities is the way to get ahead?

...
Macrophages: A Practical Approach
Macrophages: A Practical Approach

Macrophages are an important part of the immune response and are characterized by their ability to phagocytose foreign matter. However the difficulties involved in macrophage isolation mean they are some of the body's least explored cells. Macrophage Methodology describes how to isolate moderate to high yields of viable cells...

Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)
Atrial Fibrillation after Cardiac Surgery (Developments in Cardiovascular Medicine)

Cardiac surgery is performed on hundreds of thousands of patients a year, and can have an important beneficial impact on the outcomes of patients with coronary and valvular heart diseases. Despite the favorable recovery of most patients, some will have their post-operative period interrupted by the development of atrial fibrillation, with a...

Cytokines and Chemokines in Infectious Diseases Handbook (Infectious Disease)
Cytokines and Chemokines in Infectious Diseases Handbook (Infectious Disease)
Cytokines and chemokines are an important class of effector molecules that play a fundamental role in orchestrating the innate and acquired immune responses needed to eliminate or wall off invading pathogens. In vitro and in vivo studies have been instrumental in revealing the complexity of the cytokine network and the many facets of...
Management of Infectious Compli- Cations in Cancer Patients
Management of Infectious Compli- Cations in Cancer Patients

Infection is a major cause of morbidity and mortality in patients with neoplastic disease because of compromised host defenses. These defects result in an increased risk of infection and its complications. The nature of the underlying malignancy, the immunodeficiencies associated with it, and the treatments directed against it are all...

Computer and Information Security Handbook
Computer and Information Security Handbook

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical...

Learning Docker - Second Edition: Build, ship, and scale faster
Learning Docker - Second Edition: Build, ship, and scale faster

Docker lets you create, deploy, and manage your applications anywhere at anytime – flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture

About This Book

  • This up-to-date edition...
Literary Representations of “Mainlanders” in Taiwan (Routledge Research on Taiwan Series)
Literary Representations of “Mainlanders” in Taiwan (Routledge Research on Taiwan Series)

This book examines literary representations of mainlander identity articulated by Taiwan’s second-generation mainlander writers, who share the common feature of emotional ambivalence between Taiwan and China.

Closely analyzing literary narratives of Chinese civil war migrants and their descendants in Taiwan, a...

DHCP for Windows 2000
DHCP for Windows 2000
Dynamic Host Configuration Protocol (DHCP) provides a means of allocating and managing IP addresses dynamically over a network. Before the advent of DHCP, administrators configured each host on a network with an IP address, subnet mask, and default gateway. Maintaining the changes and the logs of the changes took a tremendous amount of time and was...
unlimited object storage image
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy