Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi IoT Projects: Prototyping Experiments for Makers
Raspberry Pi IoT Projects: Prototyping Experiments for Makers

Build your own Internet of Things (IoT) projects for prototyping and proof-of-concept purposes. This book contains the tools needed to build a prototype of your design, sense the environment, communicate with the Internet (over the Internet and Machine to Machine communications) and display the results.

Raspberry Pi IoT...

RFID Field Guide : Deploying Radio Frequency Identification Systems
RFID Field Guide : Deploying Radio Frequency Identification Systems

Whatever your industry or application, RFID Field Guide is your comprehensive guide to planning, designing, and deploying RFID technologies. Two leading RFID consultants draw on their extensive experience to cut through the hype associated with RFID technology...

Networked RFID: Systems, Software and Services (Computer Communications and Networks)
Networked RFID: Systems, Software and Services (Computer Communications and Networks)
RFID technology has been available for decades, but it is only recently that its application has become a core topic for computing. This book introduces the technologies and techniques of large-scale RFID-enabled mobile computing systems, set in the context of specific case studies.

The book begins with a quick introduction to RFID basics and...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

Network and System Security
Network and System Security

Network and System Security provides focused coverage of network and system security technologies. Explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long term challenges in the authors' respective areas of expertise....

Getting Started with RFID: Identify Objects in the Physical World with Arduino
Getting Started with RFID: Identify Objects in the Physical World with Arduino
The process of identifying physical objects is such a fundamental part of our experience that we seldom think about how we do it. We use our senses, of course: we look at, feel, pick up, shake and listen to, smell, and taste objects until we have a reference for them—then we give them a label. The whole...
Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects
Practical .NET 2.0 Networking Projects demonstrates some of the key networking technologies that are being made easily accessible through .NET Framework 2.0. It discusses communication between wired machines and between networks and mobile devices. The book teaches you about the technologies by walking you through sample projects in a...
Wireless Positioning Technologies and Applications (Technology and Applications)
Wireless Positioning Technologies and Applications (Technology and Applications)
At last--here's a comprehensive book that puts full details on all short-range wireless-positioning methods at your command for instant access and use. This one-stop resource surveys each technique's theory of operation, advantages and disadvantages, applicability in different domains, implementation procedures, and accuracy to help you select the...
Pro Mapping in BizTalk Server 2009 (Expert's Voice in BizTalk)
Pro Mapping in BizTalk Server 2009 (Expert's Voice in BizTalk)
Learn good map design techniques for BizTalk Server and you will make huge differences to the processing speed of your implementation, as well as to the scalability and maintainability of your code. Regardless of your experience, expert authors Jim Dawson and John Wainwright ensure you make the right choices to...
Security in Computing (4th Edition)
Security in Computing (4th Edition)
The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security

For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information...

Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)
Telecommunications Essentials, Second Edition: The Complete Global Source (2nd Edition)

Telecommunications Essentials, Second Edition, provides a comprehensive overview of the rapidly evolving world of telecommunications. Providing an in-depth, one-stop reference for anyone wanting to get up to speed on the $1.2 trillion telecommunications industry,...

Security for Wireless Sensor Networks (Advances in Information Security)
Security for Wireless Sensor Networks (Advances in Information Security)
From the reviews:

 

"Security for Wireless Sensor Networks provides a detailed overview of wireless sensor security issues, describing techniques for protecting networks and the results of recent studies in wireless sensor network security. Aimed at network security researchers and designers, this volume takes a high-level...

Result Page: 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy