Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things Programming Projects: Build modern IoT solutions with the Raspberry Pi 3 and Python
Internet of Things Programming Projects: Build modern IoT solutions with the Raspberry Pi 3 and Python

A practical project-based guide to help you build and control your IoT projects

Key Features

  • Leverage the full potential of IoT with the combination of Raspberry Pi 3 and Python
  • Build complex Python-based applications with IoT
  • Work on various IoT projects...
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner
Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner

Build distributed applications that resolve data ownership issues when working with transactions between multiple parties

Key Features

  • Explore a perfect balance between theories and hands-on activities
  • Discover popular Blockchain use cases such as Bitcoin
  • ...
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust
Hands-On Concurrency with Rust: Confidently build memory-safe, parallel, and efficient software in Rust

Get to grips with modern software demands by learning the effective uses of Rust's powerful memory safety.

Key Features

  • Learn and improve the sequential performance characteristics of your software
  • Understand the use of operating system processes in a high-scale...
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers
Cracking Codes with Python: An Introduction to Building and Breaking Ciphers

Learn how to program in Python while making and breaking ciphers—algorithms used to create and send secret messages! 

After a crash course in Python programming basics, you’ll learn to make, test, and hack programs that encrypt text with classical ciphers like the transposition cipher and Vigenère
...

SQL Server 2012 Data Integration Recipes: Solutions for Integration Services and Other ETL Tools (Expert's Voice in SQL Server)
SQL Server 2012 Data Integration Recipes: Solutions for Integration Services and Other ETL Tools (Expert's Voice in SQL Server)

SQL Server 2012 Data Integration Recipes provides focused and practical solutions to real world problems of data integration. Need to import data into SQL Server from an outside source? Need to export data and send it to another system? SQL Server 2012 Data Integration Recipes has your back. You'll find solutions...

Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
This book is intended for individuals who are interested in the iPhone and other iOS devices and, more importantly, in the type of data that is stored and can be recovered from these devices. The demand for mobile forensics has grown tremendously with the release of smart phones. Communication on these devices is now documented...
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam
PMP Exam Prep, Eighth Edition - Updated: Rita's Course in a Book for Passing the PMP Exam

This book has been FULLY updated to reflect PMI's changes to the PMP Exam Content Outline dated June 2015, and is intended for all PMP exams taken AFTER November 1st, 2015. If you are taking the PMP exam on or before November 1st of 2015, please contact the Publisher.

Can you imagine valuing a book so much that you...

Introducing Elixir: Getting Started in Functional Programming
Introducing Elixir: Getting Started in Functional Programming

Elixir is an excellent language if you want to learn about functional programming, and with this hands-on introduction, you’ll discover just how powerful and fun Elixir can be. This language combines the robust functional programming of Erlang with a syntax similar to Ruby, and includes powerful features for...

Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
Tools for Signal Compression: Applications to Speech and Audio Coding (ISTE)
In everyday life, we often come in contact with compressed signals: when using mobile telephones, mp3 players, digital cameras, or DVD players. The signals in each of these applications, telephone-band speech, high fidelity audio signal, and still or video images are not only sampled and quantized to put them into a form suitable for...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy