Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Raspberry Pi By Example
Raspberry Pi By Example

Start building amazing projects with the Raspberry Pi right out of the box

About This Book

  • Explore the vast range of opportunities provided by Raspberry Pi and other hardware components such as a webcam, the Pi camera, and sensors
  • Get hands-on experience with coding, networking, and...
Remix and Life Hack in Hip Hop: Towards a Critical Pedagogy of Music (Youth, Media, and Culture)
Remix and Life Hack in Hip Hop: Towards a Critical Pedagogy of Music (Youth, Media, and Culture)

Many hiphoppas labour to sustain Hiphop Kulture in their communities far from the big stages, world tours, and hit singles enjoyed by a shockingly few American hiphoppas. The creative labour of these few mega stars is calculated in billions of dollars. But for most hiphoppas, their creative labour may never get expressed in economic terms....

Designing Digital Games: Create Games with Scratch! (Dummies Junior)
Designing Digital Games: Create Games with Scratch! (Dummies Junior)
The easy way for kids to get started with video game design

Is your youngster a designer at heart? Read on! Designing Digital Games helps children apply their design skills to video game design using Scratch—and this book! Introducing simple programming concepts over the course of three easy-to-follow projects,...

Threat Forecasting: Leveraging Big Data for Predictive Analysis
Threat Forecasting: Leveraging Big Data for Predictive Analysis

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop...

Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
This book is a step-by-step guide to building your own SharePoint farm in a home lab setting. Learn how to build a windows domain and then join servers into the domain in order to create your own testing and learning environment. After you get the domain stood up, where you go from there is up to you.  This book will help you learn how...
Essentials of Economics - Standalone book (Irwin Economics)
Essentials of Economics - Standalone book (Irwin Economics)

Written specifically for the one semester survey of economics course, Schiller’s Essentials of Economics is known for seeking the best possible answers to the basic questions of WHAT, HOW, and FOR WHOM to produce. As in earlier editions, the tenth edition strives to arouse interest in economic theories by illustrating them in the...

Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)
Java in 21 Days, Sams Teach Yourself (Covering Java 8) (7th Edition)

In just 21 days you can acquire the knowledge and skills necessary to develop applications on your computer and apps that run on Android phones and tablets. With this complete tutorial you’ll quickly master the basics and then move on to more advanced features and concepts.

Completely updated for Java 8,...

Learn Office 2016 for Mac
Learn Office 2016 for Mac

A practical, hands-on approach to using Office 2016 applications to create and edit documents and get work done efficiently. You'll learn how to customize Office, design, create, and share documents, manipulate data in a spreadsheet, and create lively presentations. You'll also discover how to organize your email, contacts, and tasks...

Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices

This book explains the ongoing war between private business and cyber criminals, state-sponsored attackers, terrorists, and hacktivist groups. Further, it explores the risks posed by trusted employees that put critical information at risk through malice, negligence, or simply making a mistake. It clarifies the historical context of the...

Principles of Medical Biochemistry, 4e
Principles of Medical Biochemistry, 4e

For nearly 30 years, Principles of Medical Biochemistry has integrated medical biochemistry with molecular genetics, cell biology, and genetics to provide complete yet concise coverage that links biochemistry with clinical medicine. The 4th Edition of this award-winning text by Drs. Gerhard Meisenberg and William H. Simmons has...

Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka
Big Data SMACK: A Guide to Apache Spark, Mesos, Akka, Cassandra, and Kafka

Learn how to integrate full-stack open source big data architecture and to choose the correct technology―Scala/Spark, Mesos, Akka, Cassandra, and Kafka―in every layer. 

Big data architecture is becoming a requirement for many different enterprises. So far, however, the focus has largely been on collecting,...

Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
Dictionary of Computer Acronyms and Abbreviations: Plus File Name Extensions (Words R Us Computer Dictionaries) (Volume 2)
This Companion Volume to our Dictionary of Computer and Internet Terms (Vol.2) - Dictionary of Computer Acronyms and Abbreviations, has 4,300 terms. It also includes a section on file name extensions with 38,000 entries showing the most commonly used extensions and their association with various software systems. Volume 1 contains over 32,000...
Result Page: Previous 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 Next 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy