Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV

Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study. 

Fully updated...

Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python
Design Patterns in Python: Common GOF (Gang of Four) Design Patterns implemented in Python

*** Book also provides you FREE Access to Online Instructional Videos. See video codes in the book ***

This book is about the 23 common GoF (Gang of Four) Design Patterns implemented and in Python.

A Design Pattern is a description or template that can be repeatedly applied to a commonly recurring...

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Our self-published version of Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187) has been retired. For the current version of this title, which includes a new cover and introduction, please look for Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) available from...
Head First Design Patterns: Building Extensible and Maintainable Object-Oriented Software 2nd Edition
Head First Design Patterns: Building Extensible and Maintainable Object-Oriented Software 2nd Edition

What will you learn from this book?

You know you don't want to reinvent the wheel, so you look to Design Patterns: the lessons learned by those who've faced the same software design problems. With Design Patterns, you get to take advantage of the best practices and experience of others so you...

Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
AutoCAD: Professional Tips and Techniques
AutoCAD: Professional Tips and Techniques
Build Your Skills with Hundreds of Helpful Ideas from Two AutoCAD Superstars

Two AutoCAD experts distill years of combined experience into hundreds of the most useful AutoCAD tips and techniques you'll ever find. Fun, easy to read, and packed with information, this beautiful guide equips you with inside tricks on critical AutoCAD
...
Visual Basic .NET Power Tools
Visual Basic .NET Power Tools

We can ask heretical questions such as why OOP should be used in all programming situations as many of its proponents insist. We can question the wisdom of allowing C programmers to write the narratives and code examples for the Help system in VB.NET. We can wonder why structures are included in VB.NET if OOP experts insist that you should...

Dissecting the Hack: The V3rb0t3n Network
Dissecting the Hack: The V3rb0t3n Network

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will...

Blues Guitar For Dummies (Computer/Tech)
Blues Guitar For Dummies (Computer/Tech)
Packed with musical examples, chord charts, and photos

Re-create the sounds of the blues masters--without reading music!

Want to play the blues? Can't read music? No problem! This fun, accessible guide shows you how to play blues scales, chords, progressions, riffs, and solos. From Delta blues and modern blues
...
Wireless Networks First-Step
Wireless Networks First-Step

Your First-Step into the World of Wireless Networks

  • No experience required!

  • Gain an understanding of wireless networking basics with this reader friendly guide

  • ...
Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

unlimited object storage image
Result Page: 251 250 249 248 247 246 245 244 243 242 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy