Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encyclopedia of Junk Food and Fast Food
Encyclopedia of Junk Food and Fast Food
Eating junk food and fast food is a great all-American passion. American kids and grownups love their candy bars, Big Macs and supersized fries, Doritos, Twinkies, and Good Humor ice cream bars. The disastrous health effects from the enormous appetite for these processed fat- and sugar-loaded foods are well publicized now. This was particularly...
Broadband Internet: Access, Regulation and Policy
Broadband Internet: Access, Regulation and Policy
The internet has become so widespread that such issues as access, regulation and related policies have become major factors in the economy and social fabric of societies in every part of the world. Peoples without running water are demanding access to the internet and those without it are becoming deprived citizens. This new book examines current...
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more
Python Social Media Analytics: Analyze and visualize data from Twitter, YouTube, GitHub, and more

Leverage the power of Python to collect, process, and mine deep insights from social media data

About This Book

  • Acquire data from various social media platforms such as Facebook, Twitter, YouTube, GitHub, and more
  • Analyze and extract actionable insights from your social data using various...
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)
Setting Foundations for the Creation of Public Value in Smart Cities (Public Administration and Information Technology)

 This book seeks to contribute to prior research facing the discussion about public value creation in Smart Cities and the role of governments.  In the early 21st century, the rapid transition to a highly urbanized population has made societies and their governments around the world to be meeting unprecedented challenges...

Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Hacking and Securing iOS Applications: Stealing Data, Hijacking Software, and How to Prevent It
Data is stolen; this is no uncommon occurrence. The electronic information age has made the theft of data a very lucrative occupation. Whether it’s phishing scams or largescale data breaches, criminals stand to greatly benefit from electronic crimes, making their investment well worth the risk. When I say that this occurrence is not...
OpenStack Cloud Computing Cookbook - Second Edition
OpenStack Cloud Computing Cookbook - Second Edition

Over 100 recipes to successfully set up and manage your OpenStack cloud environments with complete coverage of Nova, Swift, Keystone, Glance, Horizon, Neutron, and Cinder

Overview

  • Updated for OpenStack Grizzly
  • Learn how to install, configure, and manage all of the OpenStack core projects...
Probabilistic Approaches to Robotic Perception (Springer Tracts in Advanced Robotics)
Probabilistic Approaches to Robotic Perception (Springer Tracts in Advanced Robotics)

This book tries to address the following questions: How should the uncertainty and incompleteness inherent to sensing the environment be represented and modelled in a way that will increase the autonomy of a robot? How should a robotic system perceive, infer, decide and act efficiently? These are two of the challenging questions robotics...

Mobile Ad Hoc Networking
Mobile Ad Hoc Networking
The wireless arena has been experiencing exponential growth in the past decade. We have
seen great advances in network infrastructures, growing availability of wireless applications,
and the emergence of omnipresent wireless devices such as portable or handheld
computers, PDAs, and cell phones, all getting more powerful in their
...
Building Websites With Joomla!: A step by step tutorial to getting your Joomla! CMS website up fast
Building Websites With Joomla!: A step by step tutorial to getting your Joomla! CMS website up fast
This book is being written in a small village in Sachsen-Anhalt in Germany, among other places. I live in this village. There is no access to DSL here; there are no public WLAN hotspots, no UMTS, no large companies and no city noise.

My work consists of activities like lecturing, advising, listening, testing and trying, programming,
...
Education in Rwanda: Rebalancing Resources to Accelerate Post-Conflict Development and Poverty Reduction (World Bank Country Study)
Education in Rwanda: Rebalancing Resources to Accelerate Post-Conflict Development and Poverty Reduction (World Bank Country Study)
Ten years after the 1994 genocide in which an estimated 10 percent of the country’s population perished, Rwanda’s devastated education system is now back on its feet. Classrooms have been repaired and new ones built; teachers who fled the mayhem have been reintegrated into the teaching force; arrears in teacher pay have been cleared up;...
Electronic Circuits for the Evil Genius
Electronic Circuits for the Evil Genius

FROM CIRCUIT FAINT HEART TO CIRCUIT LION HEART IN 57 EASY AND FUN LESSONS

Featuring everything an electronics hobbyist could want to learn about circuits and circuit design, Dave Cutcher's Electronic Circuits for the Evil Genius makes it fun to achieve genuine mastery, one simple lesson at a time. What's...

unlimited object storage image
Result Page: 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 105 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy