Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
Arduino and LEGO Projects
Arduino and LEGO Projects

We all know how awesome LEGO is, and more and more people are discovering how many amazing things you can do with Arduino. In Arduino and LEGO Projects, Jon Lazar shows you how to combine two of the coolest things on the planet to make fun gadgets like a Magic Lantern RF reader, a sensor-enabled LEGO music box, and even an...

RFID-A Guide to Radio Frequency Identification
RFID-A Guide to Radio Frequency Identification
This book provides an introduction to RFID technology. It describes and addresses the following: How RFID works, how it is and can be used in current and future applications. The History of RFID technology, the current state of practice and where RFID is expected to be taken in the future. The role of middleware software to route data between the...
Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Handbook of Enterprise Integration
Handbook of Enterprise Integration

Maintaining compatibility among all affected network and application interfaces of modern enterprise systems can quickly become costly and overwhelming. This handbook presents the knowledge and practical experience of a global group of experts from varying disciplines to help you plan and implement enterprise integration projects that respond...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Delphi/Kylix Database Development
Delphi/Kylix Database Development
The aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of...
Mike Meyers' Comptia RFID+ Certification Passport
Mike Meyers' Comptia RFID+ Certification Passport
From the #1 Name in Professional Certification

Get on the fast track to becoming CompTIA RFID+ certified with this affordable, portable study tool. Inside, RFID experts guide you on your career path, providing expert tips and sound advice along the way. With an intensive focus on only what you need to know to pass the CompTIA...

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Multivariate Public Key Cryptosystems (Advances in Information Security)
Multivariate Public Key Cryptosystems (Advances in Information Security)

Multivariate public key cryptosystems (MPKC) is a fast-developing new area in cryptography. In the past 10 years, MPKC schemes have increasingly been seen as a possible alternative to number theoretic-based cryptosystems such as RSA, as they are generally more efficient in terms of computational effort. As quantum computers are developed, MPKC...

BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)

By the time you’re reading this in a bookstore, BizTalk will have celebrated its tenth birthday. Over the past decade, there have been seven releases of Microsoft’s enterprise integration server, and it has become the most broadly deployed integration middleware technology in the industry, with over 10,000 customers worldwide....

Beginning NFC: Near Field Communication with Arduino, Android, and PhoneGap
Beginning NFC: Near Field Communication with Arduino, Android, and PhoneGap

Jump into the world of Near Field Communications (NFC), the fast-growing technology that lets devices in close proximity exchange data, using radio signals. With lots of examples, sample code, exercises, and step-by-step projects, this hands-on guide shows you how to build NFC applications for Android, the Arduino microcontroller,...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy