Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV

Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study. 

Fully updated...

Distributed Operating Systems
Distributed Operating Systems

As distributed computer systems become more pervasive, there is a need for a book that explains how their operating systems are designed and implemented. This book, which is a revised and expanded Part II of the best selling MODERN OPERATING SYSTEMS, fulfills that need. KEY TOPICS: It covers the material from the original...

Daniel Arbuckle's Mastering Python
Daniel Arbuckle's Mastering Python

Key Features

  • Covers the latest and advanced concepts of Python such as parallel processing with Python 3.6
  • Explore the Python language from its basic installation and setup to concepts such as reactive programming and microservices
  • Get introduced to the mechanism for rewriting code in a...
Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design
Beautiful Architecture: Leading Thinkers Reveal the Hidden Beauty in Software Design
What are the ingredients of robust, elegant, flexible, and maintainable software architecture? Beautiful Architecture answers this question through a collection of intriguing essays from more than a dozen of today's leading software designers and architects. In each essay, contributors present a notable software architecture, and analyze...
Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Mastering the Raspberry Pi
Mastering the Raspberry Pi

You probably already know that the Raspberry Pi is an excellent teaching tool. If you want to teach Linux basics or Python programming or basic electronics, it's a great place to start. But what if you are an electronics engineer or a Linux systems administrator or a very experienced maker? You want to know all of the details and inner...

Raspberry Pi Cookbook for Python Programmers
Raspberry Pi Cookbook for Python Programmers

Over 50 easy-to-comprehend tailor-made recipes to get the most out of the Raspberry Pi and unleash its huge potential using Python

Overview

  • Install your first operating system, share files over the network, and run programs remotely
  • Unleash the hidden potential of the Raspberry Pi's...
Computer Science Handbook, Second Edition
Computer Science Handbook, Second Edition

The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction. With a complete revision of its sections on software engineering, architecture, and...

CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)
CryptoGraphics: Exploiting Graphics Cards For Security (Advances in Information Security)

Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes.

CryptoGraphics: Exploiting Graphics Cards for Security...

The Turing Test and the Frame Problem: Ai's Mistaken Understanding of Intelligence
The Turing Test and the Frame Problem: Ai's Mistaken Understanding of Intelligence
Part of what it means to be a researcher is to identify what appears to be a relationship that others either have not noticed or have not fully appreciated. Both the Turing test and the frame problem have been significant items of discussion for more than 20 years in the philosophy of artificial intelligence and the philosophy of mind, but there...
Privacy Preserving Data Mining (Advances in Information Security)
Privacy Preserving Data Mining (Advances in Information Security)
Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a "Data-Mining Moratorium Act" introduced in the U.S. Senate that would...
unlimited object storage image
Result Page: 188 187 186 185 184 183 182 181 180 179 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy