Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios
The Big Book of Dashboards: Visualizing Your Data Using Real-World Business Scenarios

The definitive reference book with real-world solutions you won't find anywhere else

The Big Book of Dashboards presents a comprehensive reference for those tasked with building or overseeing the development of business dashboards.

Comprising dozens of examples that address different industries...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Intermediate Robot Building
Intermediate Robot Building

Greetings robot builder!

Over the years, I’ve created many homemade robots (some of which, only the builder could love). However, with each successive robotic generation, I try to gradually expand my knowledge of electronics, mechanics, machining, software, and art by experimenting with new techniques, features, or parts...

iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
Anatomy of a Robot (TAB Robotics)
Anatomy of a Robot (TAB Robotics)
This work looks under the hood of all robotic projects, stimulating teachers, students, and hobbyists to learn more about the gamut of areas associated with control systems and robotics. It offers a unique presentation in providing both theory and philosophy in a technical yet entertaining way.

UNDER THE HOOD OF A
...
Handbook of Modern Sensors: Physics, Designs, and Applications
Handbook of Modern Sensors: Physics, Designs, and Applications
Seven years have passed since the publication of the previous edition of this book. During that time, sensor technologies have made a remarkable leap forward. The sensitivity of the sensors became higher, the dimensions became smaller, the selectivity became better, and the prices became lower. What have not changed are the...
Medical Imaging: Essentials for Physicians
Medical Imaging: Essentials for Physicians

"An excellent primer on medical imaging for all members of the medical profession . . . including non-radiological specialists. It is technically solid and filled with diagrams and clinical images illustrating important points, but it is also easily readable . . . So many outstanding chapters . . . The book uses little mathematics...

No Middle Name: The Complete Collected Jack Reacher Short Stories
No Middle Name: The Complete Collected Jack Reacher Short Stories

NEW YORK TIMES BESTSELLER • Get ready for the ultimate Jack Reacher experience: a thrilling new novella and eleven previously published stories, together for the first time in one pulse-pounding collection from Lee Child.

No Middle Name begins with “Too Much Time,” a brand-new work of
...

Foundations of Java for ABAP Programmers
Foundations of Java for ABAP Programmers
Java has been a part of developers’ vocabularies since 1995. At first it was thought of as
being a nice, neat little language that could do some amazing things for the Internet. However,
the language soon matured, and it still kept its simple approach. Developers started to realize
the awesome power of a clean uncluttered
...
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
Black & Decker The Book of Home Improvement: The Most Popular Remodeling Projects Shown in Full Detail
This comprehensive guide to home improvement includes the top 100 home improvement projects, all in full, step-by-step instruction, and all from the trusted experts at BLACK+DECKER.

Boasting 560 pages of hardworking, how-to instructions and photos, this is quite possibly the only home remodeling you, or any
...
Furniture Repair and Restoration
Furniture Repair and Restoration

Why get into furniture restoration? One reason is that there probably is no greater feeling of satisfaction than the one you get when you bring that newly restored chair to its place of honor in the living room. You put it in exactly the right place, stand back - and feel good. A few months ago, that chair was battered and bruised, an...

Result Page: 29 28 27 26 25 24 23 22 21 20 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy