|
|
|
|
ABAP Basics
ABAP Basics is an ideal companion on your journey towards your first working SAP applications. Whether you’re already familiar with another programming language or ABAP is your first, this introduction to ABAP provides you with comprehensive and structured basics on programming business-critical software. Get to know all relevant... | | Semi-active Suspension Control: Improved Vehicle Ride and Road Friendliness
Semi-active Suspension Control provides an overview of vehicle ride control employing smart semi-active damping systems (controlled dissipative elements which only require low energy input). These systems are able to tune the amount of damping in response to measured vehicle-ride and handling indicators.
Two physically... | | The Linux TCP/IP Stack: Networking for Embedded Systems (Networking Series)
The Linux TCP/IP Stack: Networking for Embedded Systems provides an in-depth guide to implementing and using the Linux TCP/IP stack in embedded systems projects. It begins with a general overview of TCP/IP networking, with background information on applicable networking standards. From there, it details the TCP/IP implementation in Linux 2.6... |
|
|
|
Matlab: A Practical Introduction to Programming and Problem Solving
Assuming no knowledge of programming, this book presents both programming concepts and MATLAB's built-in functions, providing a perfect platform for exploiting MATLAB's extensive capabilities for tackling engineering problems. It starts with programming concepts such as variables, assignments, input/output, and selection statements,... | | BeagleBone Home Automation
The Internet of Things is now being taken up by tech corporations but this fantastic book brings you the DIY approach to home automation using BeagleBone. From dimming the lights to opening the garage door -- it's all here.
Overview
-
Practical approach to home automation using BeagleBone; starting from...
| | HackNotes(tm) Web Security Pocket ReferenceHackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted... |
|
|
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |