Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Embedded Linux Systems
Building Embedded Linux Systems
There's a great deal of excitement surrounding the use of Linux in embedded systems -- for everything from cell phones to car ABS systems and water-filtration plants -- but not a lot of practical information. Building Embedded Linux Systems offers an in-depth, hard-core guide to putting together embedded systems based on Linux.
...
Pro TypeScript: Application-Scale JavaScript Development
Pro TypeScript: Application-Scale JavaScript Development

JavaScript is everywhere, both as a pure language and in popular libraries like Angular, jQuery and Knockout, but users of modern object-oriented languages like Java and C# often find JavaScript frustrating to use and hard to extend to large-scale applications. TypeScript is an innovative open source language from Microsoft that combines...

MP3: The Definitive Guide
MP3: The Definitive Guide
MP3, standing for MPEG-1, Layer 3, is a codec for compressing the size of audio files for digital distribution. Much more than a definition, MP3 is nothing less than a cultural and economic revolution on the Internet. Every day, hundreds of thousands of MP3 music files are searched for, shared, recorded and listened to by computer and Internet...
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux
Visual Studio Code Distilled: Evolved Code Editing for Windows, macOS, and Linux

Use Visual Studio Code to write and debug code quickly and efficiently on any platform, for any device, using any programming language, and on the operating system of your choice.

Visual Studio Code is an open source and cross-platform development tool that focuses on code editing across a variety of development...

Handbook of Computer Crime Investigation: Forensic Tools & Technology
Handbook of Computer Crime Investigation: Forensic Tools & Technology
Computers can be used in virtually any type of crime, ranging from cyberstalking and child pornography to financial fraud, espionage and terrorism. The Handbook of Computer crime investigation presents detailed technical information that can be used to help solve these crimes.

Following on the success of his introductory text, Digital
...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Occupational and Environmental Safety and Health (Studies in Systems, Decision and Control, 202)
Occupational and Environmental Safety and Health (Studies in Systems, Decision and Control, 202)
This book explores a number of important issues in the area of occupational safety and hygiene. Presenting both research and best practices for the evaluation of occupational risk, safety and health in various types of industry, it particularly focuses on occupational safety in automated environments, innovative management systems and...
TCP/IP Professional Reference Guide
TCP/IP Professional Reference Guide
The TCP/IP suite has evolved from an academic networking tool to the driving force behind the Internet, intranets, and extranets. Advances in networking and communications software based upon the TCP/IP protocol suite has opened a new range of technologies that have the potential to considerably effect our lives. A comprehensive reference, TCP/IP...
Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Summary

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Cognitive Radio Technology (Communications Engineering)
Cognitive Radio Technology (Communications Engineering)
Cognitive radio technology is a smarter, faster, and more efficient way to transmit information to and from fixed, mobile, other wireless communication devices. Cognitive radio builds upon software-defined radio technology. A cognitive radio system is 'aware' of its operating environment and automatically adjusts itself to maintain desired...
The Complete Book of Intelligence Tests: 500 Exercises to Improve, Upgrade and Enhance Your Mind Strength
The Complete Book of Intelligence Tests: 500 Exercises to Improve, Upgrade and Enhance Your Mind Strength
Intelligence may be narrowly defined as the capacity to acquire knowledge and understanding, and use it in different novel situations. It is this ability, or capacity, which enables the individual to deal with real situations and profit intellectually from sensory experience. A test of intelligence is designed to formally study, under test...
unlimited object storage image
Result Page: 187 186 185 184 183 182 181 180 179 178 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy