|
|
Robot Builder's Bonanza, Third Edition (Robot Builder's Bonanza)THE BEST AND BIGGEST ROBOTICS BOOK ON THE BLOCK—NOW BETTER THAN EVER—SUPERCHARGED WITH TWO TOP ROBOTICS AUTHORS!
Thousands of robot hobbyists -- and robots -- grew up on the first two editions on this book. Now Gordon McComb has partnered with fellow robotics enthusiast Myke Predko -- and together they've... | | Teach Yourself Algebra for Electronic CircuitsThe way to go for problem-solving skills and applications, TEACH YOURSELF ALGEBRA FOR ELECTRIC CIRCUITS is the self-tutoring guide that's just right for electronics.
* Math that goes beyond elementary algebra, without the burden of heavy-duty calculus you don't need * All the tools for solving any problem in a single place--no... | | Integrated Project ManagementSuccessfully Integrate Project Management Systems Throughout the Corporate Enterprise
An essential guide for project management professionals, those working toward the PMI PMP certification, and business managers responsible for multiproject programs, Integrated Project Management shows you how to weave PM... |
|
|
Database System ConceptsDatabase management has evolved from a specialized computer application to a central component of a modern computing environment, and, as a result, knowledge about database systems has become an essential part of an education in computer science. In this text, we present the fundamental concepts of database management. These concepts include... | | Hacking Exposed VoIP: Voice Over IP Security Secrets & SolutionsBlock debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues... | | Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... |
|
|
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 |