Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Make a Robot
How to Make a Robot

Learn the basics of modern robotics while building your own intelligent robot from scratch! You'll use inexpensive household materials to make the base for your robot, then add motors, power, wheels, and electronics.

But wait, it gets better: your creation is actually five robots in one! -- build
...

Hacking the Hacker: Learn From the Experts Who Take Down Hackers
Hacking the Hacker: Learn From the Experts Who Take Down Hackers

Meet the world's top ethical hackers and explore the tools of the trade

Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...

Java 9 Recipes: A Problem-Solution Approach
Java 9 Recipes: A Problem-Solution Approach

Quickly find solutions to dozens of common programming problems encountered while building Java applications. Content is presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved!

This...

Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Firewalls Don't Stop Dragons: A Step-By-Step Guide to Computer Security for Non-Techies
Fully updated and expanded!
  • Added steps for Windows 10 and Mac OS X El Capitan
  • Over 30% more material
  • Expanded coverage on mobile device safety
  • Expanded coverage on safety for kids online
Contains well over 100 tips with complete step-by-step
...
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization
Advanced Persistent Threat Hacking: The Art and Science of Hacking Any Organization

Master the tactics and tools of the advanced persistent threat hacker

In this book, IT security expert Tyler Wrightson reveals the mindset, skills, and effective attack vectors needed to compromise any target of choice. Advanced Persistent Threat Hacking discusses the strategic issues that make all organizations...

Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Digital Addiction: Breaking Free from the Shackles of the Internet, TV and Social Media
Digital Addiction: Breaking Free from the Shackles of the Internet, TV and Social Media

Digital addiction is a very real threat.


Find freedom today and get addiction treatment for video game addiction, technology addiction, cell phone addiction, internet addiction, and social media addiction with this powerful book!

Do you find yourself struggling to break free from TV,...

Mastering IPython 4.0
Mastering IPython 4.0

Key Features

  • Most updated book on Interactive computing with IPython 4.0;
  • Detailed, example-rich guide that lets you use the most advanced level interactive programming with IPython;
  • Get flexible interactive programming with IPython using this comprehensive guide
...
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
This Companion Volume to our Dictionary of Computer and Internet Terms (Vol.2) - Dictionary of Computer Acronyms and Abbreviations, has 4,300 terms. It also includes a section on file name extensions with 38,000 entries showing the most commonly used extensions and their association with various software systems. Volume 1 contains over 32,000...
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)
Python for Graph and Network Analysis (Advanced Information and Knowledge Processing)

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego,...

Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Global Networking, Communication and Culture: Conflict or Convergence?: Spread of ICT, Internet Governance, Superorganism Humanity and Global Culture (Studies in Systems, Decision and Control)
Pursuing an interdisciplinary approach, this book offers detailed insights into the empirical relationships between overall social key figures of states and cultures in the fields of information and communication technology (ICT) (digital divide/inequality), the economy, education and religion. Its goal is to bridge the ‘cultural...
Result Page: 315 314 313 312 311 310 309 308 307 306 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy