eBooks-it.org Logo
eBooks-IT.org Inner Image

Wiley eBooks Page 106

Download free Wiley eBooks Page 106

Adventures In Raspberry Pi

Adventures In Raspberry Pi Image
Coding for kids is cool with Raspberry Pi and this elementary guideEven if your kids don't have an ounce of computer geek in them, they can learn to code with Raspberry Pi and this wonderful book. Written for 11- to 15-year-olds and assuming no prior computing knowledge, this book uses the wildly successful, low-cost, credit-card-sized Raspberry Pi computer to explain fundamental computing concepts. Young people will enjoy going through the book'snine fun projects while they learn basic programming and system administration skills, starting with the very basics of how to plug in the board and turn it on.Each project includes a lively and informative video to reinforce the lessons. It's perfect for young, eager self-learners-your kids can jump in, set...

Raspberry Pi User Guide

Raspberry Pi User Guide Image
2nd Edition
The essential guide to getting started with the Raspberry Pi The Raspberry Pi has been a success beyond the dream of its creators. Their goal, to encourage a new generation of computer programmers who understand how computers work, is well under way.Raspberry Pi User Guide 2e is the newest edition of the runaway bestseller written by the Pi's co-creator, Eben Upton, and tech writer Gareth Halfacree. It contains everything you need to know to get the Pi up and running, including how to: Connect a keyboard, mouse, monitor and other peripheralsInstall software and configure your Raspberry PiMaster basic Linux system administrationSet up your Raspberry Pi ...

Raspberry Pi User Guide

Raspberry Pi User Guide Image
Make the most out of the world's first truly compact computerIt's the size of a credit card, it can be charged like a smartphone, it runs on open-source Linux, and it holds the promise of bringing programming and playing to millions at low cost. And now you can learn how to use this amazing computer from its co-creator, Eben Upton, in Raspberry Pi User Guide. Cowritten with Gareth Halfacree, this guide gets you up and running on Raspberry Pi, whether you're an educator, hacker, hobbyist, or kid. Learn how to connect your Pi to other hardware, install software, write basic programs, and set it up to run robots, multimedia centers, and more.Gets you up and running on Raspberry Pi, a high-tech computer the size of a credit card Helps educators teach stu...

Linux Troubleshooting Bible

Linux Troubleshooting Bible Image
* An indispensable resource for Fedora users who must now work without customer support from Red Hat, Inc., covering critical troubleshooting techniques for networks, internal servers, and external servers* Chris Negus is a well-known Linux authority and also the author of the top-selling Red Hat Linux Bible (0-7645-4333-4); Thomas Weeks is a trainer and administrator who manages hundreds of Red Hat Linux systems* Covers all of the most common Fedora problem areas: firewalls, DNS servers, print servers, Samba, NFS, Web servers, FTP servers, e-mail servers, modems, adding hardware, and hardware certification* Features easy-to-use flowcharts that guide administrators step by step through common Fedora troubleshooting scenarios* A companion Web site off...

Internet Security

Cryptographic Principles, Algorithms and Protocols
Internet Security Image
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system.However, most of the books currently available on the subject are aimed at practitioners who just want to know how the various tools available on the market work and what level of security they impart. These books traditionally deal with the science and mathematics only in so far as they are necessary to understand how the tools work.Internet Security differs by its assertion that cryptography is the single most important technology for securing the Internet. To quote one reviewer "if every one of your communication partners were using a secure system based on encryption, viruses, worms and hackers would have a very hard t...



2007 - 2017 © eBooks-IT.org