eBooks-it.org Logo
eBooks-IT.org Inner Image

Practical eBooks Page 22

Download free Practical eBooks Page 22

Practical Raspberry Pi

Practical Raspberry Pi Image
Practical Raspberry Pi takes you quickly through the hardware and software basics of the Raspberry Pi. Author Brendan Horan then gets you started on a series of fun and practical projects, including a simple temperature sensor, a media center, a real-time clock, and even a security monitoring device, all of which require minimal programming experience. Along with these projects, you'll learn all about the Raspberry Pi hardware, including how it can be so powerful and still so small and inexpensive, why it's so suitable as a video player, and how you can customize it for different tasks, including running different operating systems on it, including Android and RISC OS. The Raspberry Pi is an inexpensive but relatively powerful little computer....

Optical Networks

A Practical Perspective
Optical Networks Image
3rd Edition
The third edition of Optical Networks continues to be the authoritative source for information on optical networking technologies and techniques. Componentry and transmission are discussed in detail with emphasis on practical networking issues that affect organizations as they evaluate, deploy, or develop optical networks. New updates in this rapidly changing technology are introduced. These updates include sections on pluggable optical transceivers, ROADM (reconfigurable optical add/drop multiplexer), and electronic dispersion compensation. Current standards updates such as G.709 OTN, as well as, those for GPON, EPON, and BPON are featured. Expanded d...

Practical SQL Queries

For Microsoft SQL Server 2008 R2
Practical SQL Queries Image
400+ ready-to-use, powerful SQL queries Learn powerful techniques for surfacing and delivering actionable business intelligence using SQL. Practical SQL Queries for Microsoft SQL Server 2008 R2 contains more than 400 downloadable SQL queries you can use to extract meaningful insights from large amounts of data. The application, syntax, and results of each query are described in detail. The book emphasizes SQL for use in SSMS, but the queries also apply to SSRS, WinForms, WebForms, and many other applications. Enter, maintain, and retrieve database data Search records using the Where clause Sort SQL query results with the Order By clause Create tables and perform joins on tables Perform set operations using Union, Intersect, and Except Group data an...

Practical Programming

An Introduction to Computer Science Using Python 3
Practical Programming Image
2nd Edition
This book is for anyone who wants to understand computer programming. You'll learn to program in a language that' s used in millions of smartphones, tablets, and PCs. You'll code along with the book, writing programs to solve real-world problems as you learn the fundamentals of programming using Python 3. You'll learn about design, algorithms, testing, and debugging, and come away with all the tools you need to produce quality code. In this second edition, we've updated almost all the material, incorporating the lessons we've learned over the past five years of teaching Python to people new to programming. You don't need any programming experience to g...

Practical Hacking Techniques and Countermeasures

Practical Hacking Techniques and Countermeasures Image
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws.Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques...



2007 - 2017 © eBooks-IT.org