Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)
Python in Practice: Create Better Programs Using Concurrency, Libraries, and Patterns (Developer's Library)

Winner of the 2014 Jolt Award for "Best Book"

 

“Whether you are an experienced programmer or are starting your career, Python in Practice is full of valuable advice and example to help you improve your craft by thinking about...

Gardening Basics For Dummies
Gardening Basics For Dummies

Packed with fun and useful tips to help you plan your garden!

Create the garden of your dreams with the right plants and equipment

Want a green thumb? This handy guide gives beginning gardeners tips, plans, and insider know-how for getting started with flower beds, borders, vegetables,...

Computer Security and Cryptography
Computer Security and Cryptography

Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Alfresco Enterprise Content Management Implementation
Alfresco Enterprise Content Management Implementation
This well-crafted and easy-to-use book is a complete guide to implementing enterprise content management in your business using Alfresco. It guides you through creating smart, collaborative content repositories, and shows how to use Alfresco to create more elegant document sharing, better collaborative working, and reliable automated workflow...
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Arctic Offshore Engineering
Arctic Offshore Engineering

There is an increasing need to construct engineering structures in the Arctic seas. The requirement is principally generated by the oil and gas industry, because of the substantial reserves that are known to exist offshore in the Beaufort Sea, the Caspian Sea, the Barents Sea, the Pacific Ocean off the coast of Sakhalin, the Canadian Arctic,...

Accelerated C# 2005
Accelerated C# 2005

Accelerated C# 2005 teaches you both how to use core C# language concepts and wisely employ C# idioms and object-oriented design patterns--to exploit the power of C# and the common language runtime. You'll quickly master C# syntax while learning how the CLR simplifies many programming tasks. You'll also learn best practices that ensure...

Cryptography Engineering: Design Principles and Practical Applications
Cryptography Engineering: Design Principles and Practical Applications

The ultimate guide to cryptography, updated from an author team of the world's top cryptography experts.

Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the...

Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
Sams Teach Yourself PHP, MySQL and Apache All in One (2nd Edition)
You own your own business. You have also created a website for your business that details the products or services that you offer, but it doesn't allow potential customers to purchase anything online. Don't risk losing business-learn to create a dynamic online environment using only three programs. PHP, MySQL and Apache are three popular...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy