Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
C for the Microprocessor Engineer
C for the Microprocessor Engineer
C for the Microprocessor Engineer is designed to introduce the reader to the use, problems and advantages of using C as the programming medium for embedded microprocessor systems. It can be used as a general stand-alone text in microprocessor technology, since only a limited background is expected in microprocessor hardware and...
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
Sensors: Theory, Algorithms, and Applications (Springer Optimization and Its Applications)
In recent years, technological advances have resulted in the rapid development of a new exciting research direction – the interdisciplinary use of sensors for data collection, systems analysis, and monitoring. Application areas include military surveillance, environmental screening, computational neuroscience,...
Simplifying JavaScript: Writing Modern JavaScript with ES5, ES6, and Beyond
Simplifying JavaScript: Writing Modern JavaScript with ES5, ES6, and Beyond

The best modern JavaScript is simple, readable, and predictable. Learn to write modern JavaScript not by memorizing a list of new syntax, but with practical examples of how syntax changes can make code more expressive. Starting from variable declarations that communicate intention clearly, see how modern principles can improve all...

Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

User-Centered Agile Method
User-Centered Agile Method

Agile development methods began to emerge around 20 years ago. However, it was not until the early 2000s that they began to be widely used in industry. This growth was often due to the advent of Internet services requiring faster cycles of development in order to heighten the rate at which an ever-greater number of functionalities...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Programming Fundamentals: A Modular Structured Approach Using C++
Programming Fundamentals: A Modular Structured Approach Using C++
The approach of this text is to take learners through a progression of materials in order to develop skills of modular, structured programming. The text was written, for the most part, without consideration of a specific programming language. However, in many cases the C++ language is discussed as part of the explanation of the concept. Often...
Docker in Practice
Docker in Practice

Summary

An open source container system, Docker makes deploying applications painless and flexible. Docker is powerful and simple to use, and it makes life easier for developers and administrators alike providing shorter build times, fewer production bugs, and effortless application roll-out.

About...

Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Penetration Testing Basics: A Quick-Start Guide to Breaking into Systems
Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll...
Data Protection
Data Protection

This is the fundamental truth about data protection: backup is dead.

Or rather, backup and recovery, as a standalone topic, no longer has relevance in IT. As a standalone topic, it’s been killed off by seemingly exponential growth in storage and data, by the cloud, and by virtualization.

So what is data...

Elasticsearch: A Complete Guide
Elasticsearch: A Complete Guide

End-to-end Search and Analytics

About This Book

  • Solve your data analytics problems with the Elastic Stack
  • Improve your user search experience with Elasticsearch and develop your own Elasticsearch plugins
  • Design your index, configure it, and distribute it ― you'll...
Sams Teach Yourself JavaScript in 21 Days
Sams Teach Yourself JavaScript in 21 Days

The aim of Sams Teach Yourself JavaScript in 21 Days is to tutor the Web-literate novice JavaScripter through to a high level of competency in applying JavaScript to Web pages.

In addition to core uses of client-side JavaScript, Sams Teach Yourself JavaScript in 21 Days also covers emerging topics such as...

Result Page: 209 208 207 206 205 204 203 202 201 200 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy