Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Raspberry Pi
Hacking Raspberry Pi

 

DIY hardware hacking...easy as Pi ®!

Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful...

Real-Time Systems and Programming Languages: Ada, Real-Time Java and C/Real-Time POSIX (4th Edition) (International Computer Science Series)
Real-Time Systems and Programming Languages: Ada, Real-Time Java and C/Real-Time POSIX (4th Edition) (International Computer Science Series)

How do real-time systems differ from normal information systems? Which languages are best for implementing different real-time systems?

The fourth edition of this best-selling text on real-time systems answers these and other questions. It provides an in-depth analysis of the requirements for designing and
...

Windows 10 Troubleshooting (Windows Troubleshooting Series)
Windows 10 Troubleshooting (Windows Troubleshooting Series)

Learn how to troubleshoot Windows 10 the way the experts do, whatever device or form-factor you’re using. Focus on the problems that most commonly plague PC users and fix each one with a step-by-step approach that helps you understand the cause, the solution, and the tools required. Discover the connections between the...

Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Image Processing in C
Image Processing in C
This book is a tutorial on image processing. Each chapter explains basic concepts with words and figures, shows image processing results with pho- tographs, and implements the operations in C. Information herein comes from articles published in The C/C++ Users Journal from 1990 through 1998 and from the first edition of this book...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Networking For Dummies (Computer/Tech)
Networking For Dummies (Computer/Tech)
The #1 bestselling beginner's guide to computer networking—now in a new edition

Need networking know-how, but don't know where to turn? Run—don't walk—to the no-nonsense networking guidance offered in this friendly guide! Whether you're a networking administrator or an everyday computer user...

Assembly Language for Intel-Based Computers (4th Edition)
Assembly Language for Intel-Based Computers (4th Edition)

For undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture. This complete and fully updated study of assembly language for the IBM-PC teaches students how to write and debug programs at the machine level. Based on the Intel processor family, the text simplifies and...

Android Programming for Beginners
Android Programming for Beginners

Learn all the Java and Android skills you need to start making powerful mobile applications

About This Book

  • Kick-start your Android programming career, or just have fun publishing apps to the Google Play marketplace
  • A first-principles introduction to Java, via Android, which means...
Android Application Development Cookbook - Second Edition
Android Application Development Cookbook - Second Edition

Over 100 recipes to help you solve the most common problems faced by Android Developers today

About This Book

  • Find the answers to your common Android programming problems, from set up to security, to help you deliver better applications, faster
  • Uncover the latest features of Android...
Ultra-Fast Fiber Lasers: Principles and Applications with MATLAB® Models (Optics and Photonics)
Ultra-Fast Fiber Lasers: Principles and Applications with MATLAB® Models (Optics and Photonics)

Ultrashort pulses in mode-locked lasers are receiving focused attention from researchers looking to apply them in a variety of fields, from optical clock technology to measurements of the fundamental constants of nature and ultrahigh-speed optical communications. Ultrashort pulses are especially important for the next generation of...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Result Page: 181 180 179 178 177 176 175 174 173 172 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy