Light in the Darkness: Black Holes, the Universe, and Us
The International Bestseller
On April 10, 2019, award-winning astrophysicist Heino Falcke presented the first image ever captured of a black hole at an international press conference—a turning point in astronomy that Science magazine called the scientific breakthrough of the year. That photo was...
PIC Microcontrollers: 50 Projects for Beginners & Experts
This book covers a series of exciting and
sensor, radar, a night buzzer, a clock, a VU
You can use it as projects book and build
clear explanations, schematics, and picture!
You can also use it as a study guide. Tl
project explains why the project is set up...
Mastering Bitcoin: Unlocking Digital Cryptocurrencies
Mastering Bitcoin is essential reading for everyone interested in learning about bitcoin basics, the technical operation of bitcoin, or if you're building the next great bitcoin killer app or business. From using a bitcoin wallet to buy a cup of coffee, to running a bitcoin marketplace with hundreds of thousands of transactions, or...
Java, Java, Java, Object-Oriented Problem Solving (3rd Edition)
This second edition of Java, Java, Java offers a robust, accessible, and flexible problem-solving perspective. The use of Unified Modeling Language (UML) diagrams throughout the text, strongly emphasizes object-oriented design. This book assists students and professionals with their most challenging problem as beginning programmers:...
PMP: Project Management Professional Exam Study Guide, Includes Audio CD
Prepare for the Latest Project Management Professional Exam
Prepare for the latest Project Management Professional (PMP®) certification exam with this new edition of the PMP Study Guide, which covers all essential procedures and concepts from A Guide to the Project Management Body of Knowledge (PMBOK® Guide), Fourth Edition....
Modern Cryptography Primer: Theoretical Foundations and Practical Applications
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these...
If you know how to program, you have the skills to turn data into knowledge using the tools of probability and statistics. This concise introduction shows you how to perform statistical analysis computationally, rather than mathematically, with programs written in Python.
You'll work with a case study throughout the...
Penetration Testing with Perl
Harness the power of Perl to perform professional penetration testing
About This Book
Write your own custom information security tools using Perl and object-oriented Perl modules
Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
|Result Page: 319 318 317 316 315 314 313 312 311 310 |