Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi By Example
Raspberry Pi By Example

Start building amazing projects with the Raspberry Pi right out of the box

About This Book

  • Explore the vast range of opportunities provided by Raspberry Pi and other hardware components such as a webcam, the Pi camera, and sensors
  • Get hands-on experience with coding, networking, and...
Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

101 Spy Gadgets for the Evil Genius
101 Spy Gadgets for the Evil Genius
101 SPY DEVICES FOR SERIOUS SNOOPING

This book offers an amazingly awesome and complete collection of professional spy tools that you can build yourself. You can build any project in this thrilling arsenal of spy devices for $30 or less! Not only that, even total beginners to electronics can construct these mind-boggling...

The Self and its Shadows: A Book of Essays on Individuality as Negation in Philosophy and the Arts
The Self and its Shadows: A Book of Essays on Individuality as Negation in Philosophy and the Arts

Stephen Mulhall presents a series of multiply interrelated essays which together make up an original study of selfhood (subjectivity or personal identity). He explores a variety of articulations (in philosophy, psychoanalysis, and the arts) of the idea that selfhood is best conceived as a matter of non-self-identity--for example, as becoming...

Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...

Weird Science: 40 Strange-Acting, Bizarre-Looking, and Barely Believable Activities for Kids
Weird Science: 40 Strange-Acting, Bizarre-Looking, and Barely Believable Activities for Kids
Discover the weird science behind the ickiest, wackiest, most unusual things ever to exist!

Would you like to make your own slime, discover how lava lamps work, or learn how materials decompose?
Have you ever heard about ball lightning or the Aurora Borealis on the news and wondered what the reporter was talking about?
Are
...

The Last Days of Las Vegas
The Last Days of Las Vegas
"The Last Days of Las Vegas" has been provided by its author, Roy Hayes, especially for PDFCHM.

“Cryptic as they come, with layers of mystery unfolding gradually, this new spy thriller is really something different: a chess puzzle that teases and  entices you on, with loads of action and appropriate amounts of sex.
...
Spy the Lie: Former CIA Officers Teach You How to Detect Deception
Spy the Lie: Former CIA Officers Teach You How to Detect Deception

THE NEW YORK TIMES BESTSELLER

Three former CIA officers--among the world's foremost authorities on recognizing deceptive behavior--share their proven techniques for uncovering a lie

Imagine how different your life would be if you could tell whether someone was lying or telling you the truth.
...

For Crying Out Loud: From Open Outcry to the Electronic Screen
For Crying Out Loud: From Open Outcry to the Electronic Screen

In Praise of For Crying Out Loud

"Endowed with strong parents and a bit of luck, Leo Melamed has made a remarkable escape from Nazi occupied Poland to building one of the pinnacles of global finance. Over four decades and more, he was the leading force in bringing his beloved 'Merc' from obscure trading pits for butter...

Use of Force: A Thriller (The Scot Harvath Series)
Use of Force: A Thriller (The Scot Harvath Series)

“With his latest pulse-pounding adventure, Brad Thor puts the rest of the genre on notice—Use of Force is the thriller to beat in 2017.”—The Real Book Spy

From #1 New York Times bestselling author Brad Thor.

As a storm rages across the Mediterranean Sea, a
...

51 High-Tech Practical Jokes for the Evil Genius
51 High-Tech Practical Jokes for the Evil Genius
Give your friends and family the shock of their lives! 51 High-Tech Practical Jokes for the Evil Genius has everything you need to pull devastatingly funny (and safe!) technical pranks. From the “evasive beeping thing” to “rats in the walls” to the “rigged lie detector,” you’ll find a plethora of...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Result Page: 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy