Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs is the de facto standard PC hardware tome used by more PC professionals and hobbyists than any other book of its kind - selling more than 2.1 million copies in it's 13-edition history. In the 13th Edition, Scott has pulled out all of the stops, adding hundreds of page of new material, two hours of all new video and more...
Rapid BeagleBoard Prototyping with MATLAB and Simulink
Rapid BeagleBoard Prototyping with MATLAB and Simulink

Leverage the power of BeagleBoard to develop and deploy practical embedded projects

Overview

  • Develop and validate your own embedded audio/video applications rapidly with Beagleboard
  • Create embedded Linux applications on a pure Windows PC
  • Full of illustrations, diagrams, and...
Mac Hacks: Tips & Tools for unlocking the power of OS X
Mac Hacks: Tips & Tools for unlocking the power of OS X

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...

Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
The Fifth Postulate: How Unraveling A Two Thousand Year Old Mystery Unraveled the Universe
What do Einstein's theory of relativity, string theory, and lots of other mind-bending—and space-bending—revelations of modern physics have in common? None of them could have been discovered until scientists and mathematicians recognized an uncomfortable truth—that there was a reason the world's greatest mathematical minds had...
Prime Numbers: The Most Mysterious Figures in Math
Prime Numbers: The Most Mysterious Figures in Math

A fascinating journey into the mind-bending world of prime numbers

Cicadas of the genus Magicicada appear once every 7, 13, or 17 years. Is it just a coincidence that these are all prime numbers? How do twin primes differ from cousin primes, and what on earth (or in the mind of a mathematician) could be sexy about prime numbers?
...

Geometric Computing: for Wavelet Transforms, Robot Vision, Learning, Control and Action
Geometric Computing: for Wavelet Transforms, Robot Vision, Learning, Control and Action

Geometric algebra (GA) is a powerful new mathematical system for computational geometry. Although its origins can be traced back to Hermann Grassmann (1844), its development as a language for space–time geometry with applications to all of physics did not begin until 1966. Suddenly, in the year 2000 it was recognized that a specialized...

Schrodinger's Rabbits: The Many Worlds of Quantum
Schrodinger's Rabbits: The Many Worlds of Quantum
"Usually quantum fuzziness appears only in ultratiny arenas, on a scale smaller than a golf ball to the degree that the golf ball is smaller than Texas. But nowadays, in labs around the world, scientists are plotting to release quantum weirdness from its subatomic prison. Before too long, quantum news won't be just for the science section...
The Social Media Marketing Book
The Social Media Marketing Book
Something strange is happening. Your advertising doesn’t work anymore, at least not like it used to. You used to be able to buy some TV time or put an ad in a newspaper, but nowadays everyone has TiVo or a DVR and gets their news online. The conversations that took place under industrial broadcast media about your products happened in small...
Network Security Through Data Analysis: Building Situational Awareness
Network Security Through Data Analysis: Building Situational Awareness

Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...

unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy