Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Semantic Web Technologies
Applied Semantic Web Technologies
Since Tim Berners-Lee’s original idea for a global system of interlinked hypertext documents from 1989, the World Wide Web has grown into the world’s biggest pool of human knowledge. Over the past few years, the Web has changed the way people communicate and exchange information. It has created new business...
Arduino Projects to Save the World
Arduino Projects to Save the World

Arduino Projects to Save the World shows that it takes little more than a few tools, a few wires and sensors, an Arduino board, and a bit of gumption to build devices that lower energy bills, help you grow our own food, monitor pollution in the air and in the ground, even warn you about earth tremors.

Arduino
...

APIs: A Strategy Guide
APIs: A Strategy Guide
APIs are a big deal and they are getting bigger. Pioneering companies such as Google, Facebook, Apple, and Twitter have exposed amazing technological solutions to the public, transforming existing businesses and creating new industries. Central to these companies’ successes are the APIs that link people and...
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection
The Software IP Detective's Handbook: Measurement, Comparison, and Infringement Detection

This book is generally about software intellectual property and specifically about the field of software forensics. While you may never testify in a courtroom, attempt to deduce the true owner of a valuable program, or measure the intellectual property (IP) value of software source code, if you are at all involved with software you...

Introduction to Embedded Systems: A Cyber-Physical Systems Approach
Introduction to Embedded Systems: A Cyber-Physical Systems Approach

The most visible use of computers and software is processing information for human consumption. We use them to write books (like this one), search for information on the web, communicate via email, and keep track of financial data. The vast majority of computers in use, however, are much less visible. They run the engine, brakes,...

Hacking the Human
Hacking the Human

Information security is about people, yet in most organizations protection remains focused on technical countermeasures. The human element is crucial in the majority of successful attacks on systems and attackers are rarely required to find technical vulnerabilities, hacking the human is usually sufficient.Ian Mann turns the black art of...

Adobe Acrobat X for Windows and Macintosh: Visual QuickStart Guide
Adobe Acrobat X for Windows and Macintosh: Visual QuickStart Guide

You have to give Adobe credit. There aren’t many companies that have managed to change the world once, let alone twice. In 1985, Adobe introduced PostScript, which became the rock on which the entire electronic publishing industry was built; they forever changed the world of professional printing. In 1994, Adobe launched...

R for SAS and SPSS Users (Statistics and Computing)
R for SAS and SPSS Users (Statistics and Computing)

While SAS and SPSS have many things in common, R is very different. My goal in writing this book is to help you translate what you know about SAS or SPSS into a working knowledge of R as quickly and easily as possible. I point out how they differ using terminology with which you are familiar, and show you which add-on packages will...

Scalable Network Monitoring in High Speed Networks
Scalable Network Monitoring in High Speed Networks

Network monitoring serves as basis for a wide scope of network operations, engineering and management. Precise network monitoring involves inspecting every packet traversing in a network. However, this is infeasible in today’s and future high-speed networks, due to significant overheads of processing, storing, and transferring...

Fundamentals in Information Theory and Coding
Fundamentals in Information Theory and Coding

This book represents my 30 years continuing education courses for graduate and master degree students at the Electronics and Telecommunications Faculty from the Technical University of Cluj Napoca, Romania and partially my research activity too. The presented topics are useful for engineers, M.Sc. and PhD students who need basics in...

Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems
Security Trends for FPGAS: From Secured to Secure Reconfigurable Systems

It is a great pleasure for me to write this foreword about a book that comes out of one of the first research projects funded by ANR, the French National Research Agency. ANR was established by the French government in 2005 to fund research projects, based on competitive schemes giving researchers the best opportunities to realize...

Programming Microsoft ASP.NET 4
Programming Microsoft ASP.NET 4

In the fall of 2004, at a popular software conference I realized how all major component vendors were advertising their ASP.NET products using a new word—Ajax. Only a few weeks later, a brand new module in my popular ASP.NET master class made its debut—using Ajax to improve the user experience. At its core, Ajax is a little...

Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy