|
|
Beginning Robotics with Raspberry Pi and Arduino: Using Python and OpenCV
Learn how to use a Raspberry Pi in conjunction with an Arduino to build a basic robot with advanced capabilities. Getting started in robotics does not have to be difficult. This book is an insightful and rewarding introduction to robotics and a catalyst for further directed study.
You'll be led step by step... | | Web Applications on Azure: Developing for Global Scale
Build .NET apps on Microsoft Azure services that can grow to Internet scale. Learn how you can make smart application architecture decisions and follow best practices so that your website can handle tens of thousands of concurrent users and deliver your content globally.
Author Rob... | | Pro iOS Security and Forensics: Enterprise iPhone and iPad Safety
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vulnerabilities and attacks; working with preinstalled as well as third party tools; and strategies for keeping your data safe including backing up and screen locks.
... |
|
The Essential Guide to HTML5: Using Games to Learn HTML5 and JavaScript
There was considerable enthusiasm about the new capabilities of HTML5, and even
suggestions that no other technologies or products are necessary to produce dynamic,
engrossing, interactive websites. That may be overstating things, but it is true the new
features are exciting. HTML is HTML5. It now is possible, using just HTML,... | | | | |
|
Beginning Rust: From Novice to Professional
Learn to program with Rust in an easy, step-by-step manner on Unix, Linux shell, macOS and the Windows command line. As you read this book, you’ll build on the knowledge you gained in previous chapters and see what Rust has to offer.
Beginning Rust starts with ... | | | | Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.
Data breaches, compliance fines, and ... |
|
|
Result Page: 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 |