Your basket contains: 0 item(s) Total: 0.00
Learn the Raspberry Pi 3 from the experts!
Raspberry Pi User Guide, 4th Edition is the 'unofficial official' guide to everything Raspberry Pi 3. Written by the Pi's creator and a leading Pi guru, this book goes straight to the source to bring you the ultimate Raspberry Pi 3 manual. This new fourth edition has been updated to cover the Raspberry Pi 3 board and software, with detailed discussion on its wide array of configurations, languages, and applications. You'll learn how to take full advantage of the mighty Pi's full capabilities, and then expand those capabilities even more with add-on technologies. You'll write productivity and multimedia programs, and learn flexible programming languages that allow you to shape your Raspberry Pi into whatever you want it to be. If you're ready to jump right in, this book gets you started with clear, step-by-step instruction from software installation to system customization.
The Raspberry Pi's tremendous popularity has spawned an entire industry of add-ons, parts, hacks, ideas, and inventions. The movement is growing, and pushing the boundaries of possibility along with it-are you ready to be a part of it? This book is your ideal companion for claiming your piece of the Pi.
The credit-card sized Raspberry Pi has become a global phenomenon. Created by the Raspberry Pi Foundation to get kids interested in programming, this tiny computer kick-started a movement of tinkerers, thinkers, experimenters, and inventors. Where will your Raspberry Pi 3 take you? The Raspberry Pi User Guide, 3rd Edition is your ultimate roadmap to discovery.
Available for E-Reader (Sony, Bookeen, Iriver, etc.)
Available for Smartphones (Iphone, Samsun, HTC, etc.)
Available for Tablets (Ipad, Android, etc.)
Available for PC / MAC
This paper addresses the theory and reality of Wireless LAN security. It provides an overview of security mechanisms and explains how security works in Wireless LAN networks. An in depth analysis of the Wired Equivalent Privacy (WEP), Wi-Fi protected access (WPA) and WPA2 standards is presented. The security vulnerabilities that exist in them are analysed and explained. In the investigation, a wardriving approach is used. It is observed that about 30% of all WLANs detected during network discovery experiment operate with WEP encryption witch further investigated is proved that can be compromised with 100% success. The author discusses the potential consequences that arise from using a weak encryption. Experimental results of penetrating WPA secured network illustrate how easy it is to protect from dictionary attacks by simply using a combination of strong encryption protocol and complex key. The results of the practical part of the project are used to generate guideline in terms of choosing the right encryption method.
An essential guide on the latest version of Microsoft's server management tool
Microsoft's powerful Mastering System Center 2012 Operations Manager introduces many exciting new and enhanced feature sets that allow for large-scale management of mission-critical servers. This comprehensive guide provides invaluable coverage to help organizations monitor their environments across computers, network, and storage infrastructures while maintaining efficient and effective service levels across their applications.
Mastering System Center 2012 Operations Manager clearly shows you how this powerful server management tool can best be used to serve your organization's needs.
Just what you need to know to take full advantage of your new BlackBerry smartphone
The popular BlackBerry is used by millions of office workers and executives and has become an essential business tool. Now with an even faster and more efficient 6.0 operating system, the newest BlackBerry devices have the potential to become pocket-sized replacements for the laptop. This fifth edition of the most popular BlackBerry guide explores all the features of the new BlackBerry and its upgraded OS.
It covers setting up the device, organizing and managing your appointments and to-do list, accessing the Internet, handling e-mail, working with multimedia, synching your BlackBerry with your desktop, adding apps, and much more.
Wise advice from BlackBerry experts makes this the guide you need to get the most juice from your BlackBerry.
The definitive resource for the NRS II exams-'three complete courses in a book
Alcatel-Lucent is a world leader in designing and developing scalable systems for service providers. If you are a network designer or operator who uses Alcatel-Lucent's 7750 family of service routers, prepare for certification as an A-L network routing specialist with this complete self-study course. You'll get thorough preparation for the NRS II exams while you learn to build state-of-the-art, scalable IP/MPLS-based service networks.
The book provides you with an in-depth understanding of the protocols and technologies involved in building an IP/MPLS network while teaching you how to avoid pitfalls and employ the most successful techniques available. Topics covered include interior routing protocols, multiprotocol label switching (MPLS), Layer2/Layer3 services and IPv6. The included CD features practice exam questions, sample lab exercises, and more.
This Self-Study Guide is the authoritative resource for network professionals preparing for the Alcatel-Lucent NRS II certification exams.
Today, the internet and computer networking areessential parts of business, learning, and personal communications and entertainment. Virtually all messages or transactionssent over the internet are carried using internet infrastructure- based on advanced internet protocols. Advanced internet protocols ensure that both public and private networks operate with maximum performance, security,and flexibility.
This book is intended to provide a comprehensive technical overview and survey of advanced internet protocols, first providing a solid introduction and going on todiscuss internetworking technologies, architectures and protocols. The book also showsapplication of the concepts in next generation networks anddiscusses protection and restoration, as well as various tunnelling protocols and applications.The bookends with a thoroughdiscussion of emerging topics.
You world is just a touch away with your iPad and iPad 2!
The iPad combines the best of your favorite gadgets into one amazing, ultraportable touch device. This handy guide helps you figure out all the basics - from sending e-mail and surfing the web to playing games, making FaceTime video calls, watching movies, taking photos, downloading cool apps, and more. Whatever you want your iPad to do, the fun begins right here.
Open the book and find:
This thesis describes a face recognition system that overcomes the problem of changes in gesture and mimics in three-dimensional (3D) range images. Here, we propose a local variation detection and restoration method based on the two-dimensional (2D) principal component analysis (PCA). The depth map of a 3D facial image is first smoothed using median filter to minimize the local variation. The detected face shape is cropped & normalized to a standard image size of 101x101 pixels and the forefront nose point is selected to be the image center. Facial depthvalues are scaled between 0 and 255 for translation and scaling-invariant identification. The preprocessed face image is smoothed to minimize the local variations. The 2DPCA is applied to the resultant range data and the corresponding principal-(or eigen-) images are used as the characteristic feature vectors of the subject to find his/her identity in the database of pre-recorded faces. The system's performance is tested against the GavabDB facial databases. Experimental results show that the proposed method is able to identify subjects with different gesture and mimics in the presence of noise in their 3D facial image.
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won't need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.
You'll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You'll discover how to use the latest forensic software, tools, and equipment to find the answers that you're looking for in record time. When you understand how data is stored, encrypted, and recovered, you'll be able to protect your personal privacy as well. By the time you finish reading this book, you'll know how to:
Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit.
Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
The next generation of computer system designers will be less concerned about details of processors and memories, and more concerned about the elements of a system tailored to particular applications. These designers will have a fundamental knowledge of processors and other elements in the system, but the success of their design will depend on the skills in making system-level tradeoffs that optimize the cost, performance and other attributes to meet application requirements. This book provides a new treatment of computer system design, particularly for System-on-Chip (SOC), which addresses the issues mentioned above. It begins with a global introduction, from the high-level view to the lowest common denominator (the chip itself), then moves on to the three main building blocks of an SOC (processor, memory, and interconnect). Next is an overview of what makes SOC unique (its customization ability and the applications that drive it). The final chapter presents future challenges for system design and SOC possibilities.