Home | Amazing | Today | Tags | Publishers | Years | Search 
Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)
Performance Metrics for Haptic Interfaces (Springer Series on Touch and Haptic Systems)

Haptics technology is being used more and more in different applications, such as in computer games for increased immersion, in surgical simulators to create a realistic environment for training of surgeons, in surgical robotics due to safety issues and in mobile phones to provide feedback from user action. The existence of these applications...

Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Security Issues in Mobile NFC Devices (T-Labs Series in Telecommunication Services)
Security Issues in Mobile NFC Devices (T-Labs Series in Telecommunication Services)

This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the...

The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics, Second Edition: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers,...

Applied Computing in Medicine and Health (Emerging Topics in Computer Science and Applied Computing)
Applied Computing in Medicine and Health (Emerging Topics in Computer Science and Applied Computing)

Applied Computing in Medicine and Health is a comprehensive presentation of on-going investigations into current applied computing challenges and advances, with a focus on a particular class of applications, primarily artificial intelligence methods and techniques in medicine and health.

Applied computing is the use of...

Creating Mobile Apps with jQuery Mobile
Creating Mobile Apps with jQuery Mobile

By the time you've completed the 10 projects in this book, you'll be a dab hand at using jQuery Mobile to create apps for smartphones and tablets. Turn your basic web development knowledge into pure gold.

Overview

  • Write less, do more: learn to apply the jQuery motto to quickly craft creative sites...
Beginning Ubuntu for Windows and Mac Users
Beginning Ubuntu for Windows and Mac Users

Beginning Ubuntu for Windows and Mac Users is your comprehensive guide to using Ubuntu. You already know how to use a computer running Windows or OS X, but learning a new operating system can feel daunting. If you've been afraid to try Ubuntu because you don't know where to start, this book will show you how to get the...

ESD Basics: From Semiconductor Manufacturing to Product Use
ESD Basics: From Semiconductor Manufacturing to Product Use

Electrostatic discharge (ESD) continues to impact semiconductor manufacturing, semiconductor components and systems, as technologies scale from micro- to nano electronics. This book introduces the fundamentals of ESD, electrical overstress (EOS), electromagnetic interference (EMI), electromagnetic compatibility (EMC), and latchup, as well as...

Mobile Security: How to Secure, Privatize, and Recover Your Devices
Mobile Security: How to Secure, Privatize, and Recover Your Devices

Mobile phones and tablets enhance our lives, but they also make you and your family vulnerable to cyber-attacks or theft. This clever guide will help you secure your devices and know what to do if the worst happens.

Overview

  • Learn how mobile devices are monitored and the impact of cloud computing
  • ...
CSS: The Definitive Guide: Visual Presentation for the Web
CSS: The Definitive Guide: Visual Presentation for the Web

If you’re a web designer or app developer interested in sophisticated page styling, improved accessibility, and saving time and effort, this book is for you. This revised edition provides a comprehensive guide to CSS implementation, along with a thorough review of the latest CSS specifications.

CSS is a constantly...

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers,...

Pro Power BI Desktop
Pro Power BI Desktop

This book shows how to deliver eye-catching Business Intelligence with Microsoft Power BI Desktop. You can now take data from virtually any source and use it to produce stunning dashboards and compelling reports that will seize your audience’s attention. Slice and dice the data with remarkable ease then add metrics and KPIs to project...

Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy