Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Internet of Things Projects with ESP32: Build exciting and powerful IoT projects using the all-new Espressif ESP32
Internet of Things Projects with ESP32: Build exciting and powerful IoT projects using the all-new Espressif ESP32

Create and program Internet of Things projects using the Espressif ESP32.

Key Features

  • Getting to know the all new powerful EPS32 boards and build interesting Internet of Things projects
  • Configure your ESP32 to the cloud technologies and explore the networkable modules...
Raspberry Pi for Arduino Users: Building IoT and Network Applications and Devices
Raspberry Pi for Arduino Users: Building IoT and Network Applications and Devices
Leverage your Arduino skills in the Raspberry Pi world and see how to cross the two platforms into sophisticated programs.

The Arduino and Raspberry Pi communities overlap more than you might think. Arduinos can be expanded to have network capabilities with a variety of “shields,” all of which increase
...
WiFi Hacking for Beginners
WiFi Hacking for Beginners

In this book you will start as a beginner with no previous knowledge about penetration testing. The book is structured in a way that will take you through the basics of networking and how clients communicate with each other, then we will start talking about how we can exploit this method of communication to carry out a number of powerful...

More iPhone Development with Swift: Exploring the iOS SDK
More iPhone Development with Swift: Exploring the iOS SDK

Interested in iPhone and iPad apps development? Want to learn more? Whether you are a relative newcomer to iPhone and iPad or iOS development or an old hand looking to expand your horizons, we have the perfect Swift-flavored book for you. (Source code has been updated to reflect Xcode 6.3.2 and Swift 1.2!)

The...

Applied Network Security
Applied Network Security

Master the art of detecting and averting advanced network security attacks and techniques

About This Book

  • Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
  • Become an expert in cracking WiFi...
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Programming PIC Microcontrollers with XC8
Programming PIC Microcontrollers with XC8
Learn how to use microcontrollers without all the frills and math. This book uses a practical approach to show you how to develop embedded systems with 8 bit PIC microcontrollers using the XC8 compiler. It's your complete guide to understanding modern PIC microcontrollers.

Are you tired of...
Building Smart Drones with ESP8266 and Arduino: Build exciting drones by leveraging the capabilities of Arduino and ESP8266
Building Smart Drones with ESP8266 and Arduino: Build exciting drones by leveraging the capabilities of Arduino and ESP8266

Leverage the WiFi chip to build exciting Quadcopters

Key Features

  • Learn to create a fully functional Drone with Arduino and ESP8266 and their modified versions of hardware.
  • Enhance your drone's functionalities by implementing smart features.
  • A...
Network-Centric Service Oriented Enterprise
Network-Centric Service Oriented Enterprise
The emergence of Enterprise services has triggered a major paradigm shift in distributed computing: from Object-Oriented Architecture (OOA) to Service-Oriented Architecture (SOA). As the need grows to incorporate and exchange information across wire-line and wireless networks, so grows the necessity to establish an infrastructure for...
Mac Hacks: Tips & Tools for unlocking the power of OS X
Mac Hacks: Tips & Tools for unlocking the power of OS X

Want to take real control of your Mac? The hacks in this book help you dig below the surface to tweak system preferences, mount drives and devices, and generally do things with your system that Apple doesn’t expect you to do. With a little effort, you can make your Mac and its applications perform exactly the way you want them...

Data and Computer Communications (8th Edition)
Data and Computer Communications (8th Edition)

This book attempts to provide a unified overview of the broad field of data and computer communications. The organization of the book reflects an attempt to break this massive subject into comprehensible parts and to build, piece by piece, a survey of the state of the art.The book emphasizes basic...

iPad All-in-One For Dummies
iPad All-in-One For Dummies

Slate-style computers have been around for a few years, but it took Apple to make them catch on with the general public in a big way when it introduced the iPad. This small, less than a pound-and-a-half wonder has sold millions of units in its first year for good reason: It’s well designed, feature rich, and opens up a world of...

Result Page: 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy