Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Impact Cratering: Processes and Products
Impact Cratering: Processes and Products

Impact cratering is arguably the most ubiquitous geological process in the Solar System. It has played an important role in Earth’s history, shaping the geological landscape, affecting the evolution of life, and generating economic resources. However, it was only in the latter half of the 20th century that the importance of impact...

The Social Photo: On Photography and Social Media
The Social Photo: On Photography and Social Media
"Mr. Jurgenson makes a first sortie toward a new understanding of the photograph, wherein artistry or documentary intent have given way to communication and circulation. Like Susan Sontag’s On Photography, to which it self-consciously responds, The Social Photo is slim, hard-bitten and picture-free." –...
The Mobile Connection: The Cell Phone's Impact on Society
The Mobile Connection: The Cell Phone's Impact on Society
Rich Ling provides a compelling examination of the real impact of mobile telephony. It's not about technology, it's about people. We need more of these kinds of studies.
--Don Norman, Co-Founder, Nielsen Norman Group and author of Emotional Design

This book combines scientific rigor, penetrating insight, and attention to an
...
Computer Vision with Maker Tech: Detecting People With a Raspberry Pi, a Thermal Camera, and Machine Learning
Computer Vision with Maker Tech: Detecting People With a Raspberry Pi, a Thermal Camera, and Machine Learning

Harness the untapped potential of combining a decentralized Internet of Things (IoT) with the ability to make predictions on real-world fuzzy data. This book covers the theory behind machine learning models and shows you how to program and assemble a voice-controlled security.

You’ll learn the differences between...

The Oracle Hacker's Handbook: Hacking and Defending Oracle
The Oracle Hacker's Handbook: Hacking and Defending Oracle

Knowledge is power, and the power can be yours

While Oracle continues to improve the security features of its product, it still has a long way to go. David Litchfield has devoted years to relentlessly searching out the flaws in this ubiquitous database system and creating defenses against them. Now he offers you...

Digital Integrated Circuit Design: From VLSI Architectures to CMOS Fabrication
Digital Integrated Circuit Design: From VLSI Architectures to CMOS Fabrication
Prepublication quote: '[The top-down] emphasis of the text ... should be right on the money and is very timely.' Joanne DeGroat, Ohio State University

VLSI circuits are ubiquitous in the modern world, and designing them efficiently is becoming increasingly challenging with the development of ever smaller chips. This
...
Practical Arduino: Cool Projects for Open Source Hardware (Technology in Action)
Practical Arduino: Cool Projects for Open Source Hardware (Technology in Action)

Create your own Arduino-based designs, gain in-depth knowledge of the architecture of Arduino, and learn the user-friendly Arduino language all in the context of practical projects that you can build yourself at home. Get hands-on experience using a variety of projects and recipes for everything from home automation to test equipment.

...
Domain-Driven Design Distilled
Domain-Driven Design Distilled

Domain-Driven Design (DDD) software modeling delivers powerful results in practice, not just in theory, which is why developers worldwide are rapidly moving to adopt it. Now, for the first time, there’s an accessible guide to the basics of DDD: What it is, what problems it solves, how it works, and how to quickly...

Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age
Crypto: How the Code Rebels Beat the Government Saving Privacy in the Digital Age

The telegraph, telephone, radio, and especially the computer have put everyone on the globe within earshot— at the price of our privacy. It may feel like we're performing an intimate act when, sequestered in our rooms and cubicles, we casually use our cell phones and computers to transmit our thoughts, confidences,...

VoIP Handbook: Applications, Technologies, Reliability, and Security
VoIP Handbook: Applications, Technologies, Reliability, and Security
The number of worldwide VoIP customers is well over 38 million and thanks to popularity of inexpensive, high quality services such as skype is projected to increase to nearly 250 million within the next three years. The future of voice transport has officially arrived.

The VoIP Handbook: Applications, Technologies, Reliability, and...

Intelligent Wearable Interfaces
Intelligent Wearable Interfaces
This book introduces methodologies to develop a variety of intelligent wearable interfaces and covers practical implementations of systems for real-life applications. A number of novel intelligent wearable interface systems are examined, including network architecture for wearable robots, wearable interface for automatic language translation,...
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition
Security is a broad topic that is only becoming broader as we become more reliant on computers for everything we do, from work to home to leisure, and our computers become more and more interconnected. Most of our computing experiences now require, or are enriched by, Internet connections, which means our systems are constantly exposed to foreign...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy