Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians
Magic Is Dead: My Journey into the World's Most Secretive Society of Magicians

In the vein of Neil Strauss’ The Game and Joshua Foer’s Moonwalking with Einstein comes the fascinating story of one man’s colorful, mysterious, and personal journey into the world of magic, and his unlikely invitation into an underground secret society of revolutionary magicians from...

Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention
Internet Gaming Disorder: Theory, Assessment, Treatment, and Prevention is an informative and practical introduction to the topics of Internet gaming disorder and problematic gaming. This book provides mental health clinicians with hands-on assessment, prevention, and treatment techniques for clients with problematic gaming behaviors...
Learn Hardware Firmware and Software Design
Learn Hardware Firmware and Software Design
LHFSD is a book unlike any other! It covers the title topics in an incredible manner, and everything WORKS! --Corollary Theorems May, 2005

This book is a Practical Design Project and it contains 3 Parts: 1.Hardware Design guides the reader towards building the LHFSD PCB with a Microchip dsPIC30F4011 microcontroller running
...
Networking Fundamentals
Networking Fundamentals

A clear and concise resource on Windows networking, perfect for IT beginners

Did you know that nearly 85% of IT support roles require a good understanding of networking concepts? If you are looking to advance your IT career, you will need a foundational understanding of Windows networking. Network...

Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment (Blockchain Technologies)
Blockchain Technology for Industry 4.0: Secure, Decentralized, Distributed and Trusted Industry Environment (Blockchain Technologies)

This book explores recent advances in blockchain technology and its impact on Industry 4.0 via advanced technologies. It provides an in-depth analysis of the step by step evolution of Industry 4.0 and blockchain technologies for creating the next-generation, secure, decentralized, distributed and trusted industry environment and...

Data Analytics: Concepts, Techniques, and Applications
Data Analytics: Concepts, Techniques, and Applications

Large data sets arriving at every increasing speeds require a new set of efficient data analysis techniques. Data analytics are becoming an essential component for every organization and technologies such as health care, financial trading, Internet of Things, Smart Cities or Cyber Physical Systems. However, these diverse application...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)
Advanced Technologies in Robotics and Intelligent Systems: Proceedings of ITR 2019 (Mechanisms and Machine Science)

This volume gathers the latest advances, innovations, and applications in the field of intelligent systems such as robots, cyber-physical and embedded systems, as presented by leading international researchers and engineers at the International Conference on Intelligent Technologies in Robotics (ITR), held in Moscow, Russia on...

Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Raspberry Pi A Quick-Start Guide
Raspberry Pi A Quick-Start Guide
Over the past decades computers have gotten cheaper and cheaper, so today you can find them not only beneath your desk but in nearly every consumer electronics device such as smartphones or DVD players. Still, computers aren’t so cheap that you spontaneously buy one when shopping for your groceries. Usually, you carefully...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Result Page: 341 340 339 338 337 336 335 334 333 332 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy