Home | Amazing | Today | Tags | Publishers | Years | Search 
30 Arduino Projects for the Evil Genius
30 Arduino Projects for the Evil Genius

30 Ways to Have Some Computer-Controlled Evil Fun!

This wickedly inventive guide shows you how to program and build a variety of projects with the Arduino microcontroller development system. Covering Windows, Mac, and Linux platforms, 30 Arduino Projects for the Evil Genius gets you up to speed with the simplified C...

Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)
Data Mining in Public and Private Sectors: Organizational and Government Applications (Premier Reference Source)

Data mining has developed rapidly and has become very popular in the past two decades, but actually has its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases. The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In corporate...

Windows 7 Device Driver (Addison-Wesley Microsoft Technology Series)
Windows 7 Device Driver (Addison-Wesley Microsoft Technology Series)

This book provides the technical guidance and understanding needed to write device drivers for the new Windows 7 Operating System. It takes this very complex programming development, and shows how the Windows Driver Framework has greatly simplified this undertaking. It explains the hardware and software architecture you must...

Adobe Lightroom 3 on Demand
Adobe Lightroom 3 on Demand

Spend less time reading, more time learning. Master Adobe Photoshop Lightroom 3 from start to finish - fast!

Up-to-the-minute quick-reference material and hands-on training in an easy-to-use color format

 

Includes extensive bonus online...

Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan
Computers and Games: 7th International Conference, CG 2010, Kanazawa, Japan

This book contains the papers of the 7th Computer and Games Conference (CG 2010) held in Kanazawa, Japan. The conference took place during September 24–26, 2010 in conjunction with the 15th Computer Olympiad and the 17th World Computer Chess Championship.

The Computer and Games conference series is a major international...

How Do Witches Fly? A practical approach to nocturnal flights.
How Do Witches Fly? A practical approach to nocturnal flights.

Books which examine the folklore of Europe's traditional "witch" plants are not uncommon, and some give some coverage to describing the psychotropic and hallucinogenic effects of these plants on the human body. However this book is rather more unusual than that in that the author is first and foremost a biochemist with an...

Getting Started with Roo
Getting Started with Roo

This is my first book with O’Reilly, and I’m very grateful for their help and encouragement. Their editorial team is first class, and efficient. It was great working with you.

I, like many of you, have been using Spring for a long, long time. I wasn’t initially convinced I needed Spring Roo (to be honest). It...

Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)
Web Data Mining: Exploring Hyperlinks, Contents, and Usage Data (Data-Centric Systems and Applications)

The rapid growth of the Web in the past two decades has made it the largest publicly accessible data source in the world. Web mining aims to discover useful information or knowledge from Web hyperlinks, page contents, and usage logs. Based on the primary kinds of data used in the mining process, Web mining tasks can be categorized...

Mac OS X: The Complete Reference
Mac OS X: The Complete Reference

This book is complete: my checklists and FileMaker databases have cross-indexed features, preferences, and the applications that ship with Mac OS X, to make certain that everything shows up somewhere in the book. It has been revised against the second update—Mac OS X 10.0.2. We have tried to include screen shots of almost every feature,...

Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques

This volume contains the papers presented at the 14th International Workshop on Approximation Algorithms for Combinatorial Optimization Problems (APPROX 2011) and the 15th International Workshop on Randomization and Computation (RANDOM 2011), which took place concurrently in Princeton University, USA, during August 17–19,...

Result Page: 484 483 482 481 480 479 478 477 476 475 474 473 472 471 470 469 468 467 466 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy