eBooks-it.org Logo
eBooks-IT.org Inner Image

Wiley eBooks Page 52

Download free Wiley eBooks Page 52

Samsung Galaxy Tabs

For Dummies
Samsung Galaxy Tabs Image
A colorful, entertaining, and informative guide to the Samsung Galaxy family of tabletsSamsung's bestselling Galaxy Tabs may come in multiple sizes,but theyall sharethe wildly popular Android operating system and are packed with tons of top-notch tabletfeatures. This full-color book shows you how to enjoy all the things your Galaxy Tab can do, regardless of model: browse the web, handle e-mail, manage your social media, make phone calls and video chat, read e-books, take and share photos, play music, and more. Author Dan Gookin, famous for his skill in demystifying technology, takes you on a tour of the Galaxy, explaininghidden tablettricks and showing you how to make your Tab your own.Walks you throughevery element of the popular Galaxy Tab models, ...

Spatial Simulation

Exploring Pattern and Process
Spatial Simulation Image
A ground-up approach to explaining dynamicspatial modelling for an interdisciplinary audience.Across broad areas of the environmental and social sciences, simulation models are an important way to study systems inaccessible to scientific experimental and observational methods, and also an essential complement to those more conventional approaches. The contemporary research literature is teeming with abstract simulation models whose presentation is mathematically demanding and requires a high level of knowledge of quantitative and computational methods and approaches. Furthermore, simulation models designed to represent specific systems and phenomena are often complicated, and, as a result, difficult to reconstruct from their descriptions in the liter...

Canon EOS Rebel T5i/700D

Digital Field Guide
Canon EOS Rebel T5i/700D Image
All you need to know to use the latest exciting new dslr camera from CanonIf you want to get great photos from Canon's new Rebel T5i/700D dslr camera, you've come to the right place. This practical book takes you step by step through each button, mode, function, and feature of the hot new Rebel T5i/700D, so you'll be able to shoot with confidence, even in challenging situations. Packed with beautiful, full-color photographs and illustrations, this handy guide also reveals tricks and techniques that professionals use to snap super shots and capture compelling HD video. You'll want to keep this helpful reference on hand.Uses an easy-to-follow style to help you get the most out of the Canon EOS Rebel T5i/700D camera's 18 megapixel sensor, superb DIGIC 5...

Data Smart

Using Data Science to Transform Information into Insight
Data Smart Image
Data Science gets thrown around in the press like it's magic. Major retailers are predicting everything from when their customers are pregnant to when they want a new pair of Chuck Taylors. It's a brave new world where seemingly meaningless data can be transformed into valuable insight to drive smart business decisions.But how does one exactly do data science? Do you have to hire one of these priests of the dark arts, the "data scientist," to extract this gold from your data? Nope.Data science is little more than using straight-forward steps to process raw data into actionable insight. And inData Smart, author and data scientist John Foreman will show you how that's done within the familiar environment of a spreadsheet....

The Web Application Hacker's Handbook

Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook Image
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hac...



2007 - 2017 © eBooks-IT.org