eBooks-it.org Logo
eBooks-IT.org Inner Image

Modern eBooks

Download free Modern eBooks

Introducing Python

Modern Computing in Simple Packages
Introducing Python Image
Easy to understand and fun to read, Introducing Python is ideal for beginning programmers as well as those new to the language. Author Bill Lubanovic takes you from the basics to more involved and varied topics, mixing tutorials with cookbook-style code recipes to explain concepts in Python 3. End-of-chapter exercises help you practice what you've learned. You'll gain a strong foundation in the language, including best practices for testing, debugging, code reuse, and other development tips. This book also shows you how to use Python for applications in business, science, and the arts, using various Python tools and open source packages.Learn simple data types, and basic math and text operations. Use data-wrangling techniques with Python's built-in d...

Modern X86 Assembly Language Programming

32-bit, 64-bit, SSE and AVX
Modern X86 Assembly Language Programming Image
Modern X86 Assembly Language Programming shows the fundamentals of x86 assembly language programming. It focuses on the aspects of the x86 instruction set that are most relevant to application software development. The book's structure and sample code are designed to help the reader quickly understand x86 assembly language programming and the computational capabilities of the x86 platform. Book appendixes can be downloaded here: http://www.apress.com/9781484200650?gtmf=sMajor topics of the book include the following:32-bit core architecture, data types, internal registers, memory addressing modes, and the basic instruction setX87 core architecture, register stack, special purpose registers, floating-point encodings, and instruction setMMX technology ...

Cyber and Electromagnetic Threats in Modern Relay Protection

Cyber and Electromagnetic Threats in Modern Relay Protection Image
Cyber and Electromagnetic Threats in Modern Relay Protection provides a detailed overview of the vulnerabilities of digital protection relays to natural and intentional destructive impacts, including cyber attacks and electromagnetic intrusions. From lightning strikes, electromagnetic fields generated by operating equipment, and issues with control cable shielding to modern technical tools that realize intentional destructive impacts remotely, this first-of-its-kind text covers the latest cyber and electromagnetic threats to digital protection relays. Emphasizing the importance of relay protection to the infrastructure of a country, this book: Explains how technological advances in the power industry, like the smart grid, can create dangerous vulne...

Modern PHP

New Features and Good Practices
Modern PHP Image
PHP is experiencing a renaissance, though it may be difficult to tell with all of the outdated PHP tutorials online. With this practical guide, you';ll learn how PHP has become a full-featured, mature language with object-orientation, namespaces, and a growing collection of reusable component libraries.Author Josh Lockhart-creator of PHP The Right Way, a popular initiative to encourage PHP best practices-reveals these new language features in action. You';ll learn best practices for application architecture and planning, databases, security, testing, debugging, and deployment. If you have a basic understanding of PHP and want to bolster your skills, this is your book.Learn modern PHP features, such as namespaces, traits, generators, and closuresDisco...

Introduction to Modern EW Systems

Introduction to Modern EW Systems Image
Master the latest electronic warfare (EW) techniques and technologies related to on-board military platforms with this authoritative resource. You gain expert design guidance on technologies and equipment used to detect and identify emitter threats, giving you an advantage in the never-ending chess game between sensor guided weapons and EW systems. This unique book offers you deeper insight into EW systems principles of operation and their mathematical descriptions, arming you with better knowledge for your specific design applications. Moreover, you get practical information on how to counter modern communications data links which provide connectivity and command flow among the armed forces in the battlefield. Taking a sufficiently broad perspective...


2007 - 2017 © eBooks-IT.org