Christopher Robin | Teoria wielkiego podrywu / ... | Witchblade
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BeagleBone for Secret Agents
BeagleBone for Secret Agents

Browse anonymously, communicate secretly, and create custom security solutions with open source software, the BeagleBone Black, and cryptographic hardware

About This Book

  • Interface with cryptographic hardware to add security to your embedded project, securing you from external threats.
  • ...
Advanced Quantitative Finance with C++
Advanced Quantitative Finance with C++

Create and implement mathematical models in C++ using Quantitative Finance

About This Book

  • Describes the key mathematical models used for price equity, currency, interest rates, and credit derivatives
  • The complex models are explained step-by-step along with a flow chart of every...
Building a BeagleBone Black Super Cluster
Building a BeagleBone Black Super Cluster

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This Book

  • Configure your own cluster for high speed parallel computing
  • Benefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable...
Android Hardware Interfacing with the BeagleBone Black
Android Hardware Interfacing with the BeagleBone Black

Design and implement Android apps that interface with your own custom hardware circuits and the BeagleBone Black

About This Book

  • Design custom apps that interact with the outside world via BeagleBone Black
  • Modify Android to recognize, configure, and communicate with sensors, LEDs, memory,...
Low Tech Hacking: Street Smarts for Security Professionals
Low Tech Hacking: Street Smarts for Security Professionals

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by...

Photoshop CC: The Missing Manual
Photoshop CC: The Missing Manual

Photoshop CC is truly amazing, but it can also be overwhelming if you’re just getting started. This book makes learning Photoshop as easy as possible by explaining things in a friendly, conversational style—without technical jargon. After a thorough introduction to the program, you’ll delve deep into...

Matrix Algorithms, Volume I
Matrix Algorithms, Volume I
This book, Basic Decompositions, is the first volume in a projected five-volume series entitled Matrix Algorithms. The other four volumes will treat eigensystems, iterative methods for linear systems, sparse direct methods, and special topics, including fast algorithms for structured matrices.

My intended audience is the nonspecialist
...
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)
Bayesian Methods for Hackers: Probabilistic Programming and Bayesian Inference (Addison-Wesley Data & Analytics)

Master Bayesian Inference through Practical Examples and Computation–Without Advanced Mathematical Analysis

 

Bayesian methods of inference are deeply natural and extremely powerful. However, most discussions of Bayesian inference rely...

BeagleBone Essentials
BeagleBone Essentials

Harness the power of the BeagleBone Black to manage external environments using C, Bash, and Python/PHP programming

About This Book

  • Learn the fundamentals of Beaglebone Black via a detailed tutorial that provides practical examples, from initial board setup to device driver management
  • ...
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)
Hacking: Learn fast How to hack, strategies and hacking methods, Penetration testing Hacking Book and Black Hat Hacking (17 Most Dangerous Hacking Attacks) (Volume 4)

## ## ## The Ultimate Guide to the 17 Most Dangerous Hacking Attacks ## ## ##

Do you want to learn about today's most sophisticated Hacking attacks?

Do you want to know more about Cyber criminals and their operations?

Do you want to learn about Robot Networks, Trojans &
...

Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA
Cisco Networks: Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA

This book is a concise one-stop desk reference and synopsis of basic knowledge and skills for Cisco certification prep. For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices....

Fourier Transform Methods in Finance
Fourier Transform Methods in Finance

In recent years, Fourier transform methods have emerged as one of the major methodologies for the evaluation of derivative contracts, largely due to the need to strike a balance between the extension of existing pricing models beyond the traditional Black-Scholes setting and a need to evaluate prices consistently with the market...

Result Page: 44 43 42 41 40 39 38 37 36 35 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy