Computers & Technology
azw3, epub |eng | 2015-01-26 | Author:Norris, Donald [Norris, Donald]
Using Python with the Raspberry Pi Camera I will use a clever Python library named python-picamera, created by Dave Jones (Github), which will permit the Pi Camera to both be ...
( Category:
Electronics
January 19,2015 )
mobi, pdf |eng | 2010-08-18 | Author:Jim Boyce
ChAPTER 20 Scheduling Meetings and Resources Sending a Meeting Request . . . . . . . . . . . . . . . . . . . . ...
( Category:
Email Administration
January 19,2015 )
epub |eng | 1872-01-18 | Author:Charles Darwin [Darwin, Charles]
6. Cell-Making Instinct Of The Hive-Bee I will not here enter on minute details on this subject, but will merely give an outline of the conclusions at which I have ...
( Category:
Biographies & Memoirs
January 19,2015 )
epub |eng | | Author:Carl Zimmer
( Category:
Arts & Photography
January 18,2015 )
epub |eng | 2014-03-04 | Author:Robert Murray [Murray, Robert]
Edmund Barton and Alfred Deakin (right), the first and second prime ministers of Australia. (National Library of Australia) Most of the political and business leaders from that time on were ...
( Category:
Business & Money
January 18,2015 )
azw |eng | 1992-01-15 | Author:Paul Mungo;Bryan Clough
Chapter 6 HACKING FOR PROFIT Inevitably there are people in the computer underworld who use their skills to make money--legally or illegally. Hacking into suppliers to steal goods, or looting ...
( Category:
Arts & Photography
January 17,2015 )
epub, mobi, pdf |eng | 2014-03-13 | Author:Dave Fancher
let movies = [| ("The Terminator", "1984") ("Predator", "1987") ("Commando", "1985") ("Total Recall", "1990") ("Conan the Destroyer", "1984") |] The easiest way to sort by year is to just project ...
( Category:
Languages & Tools
January 17,2015 )
azw3 |eng | 2015-01-06 | Author:Sempé, Luis [Sempé, Luis]
Figure 54 - Using debug lines we can validate or debug any label's position and alignment. 4.3.5 Buttons A button is one of the most common devices for the player ...
( Category:
Computers & Technology
January 16,2015 )
epub |eng | 2013-12-31 | Author:Instructables.com
Glowing Redstone Block kyluddy (http://www.instructables.com/id/Minecraft-Glowing-Redstone-Block/) This is super easy and uses stuff that you already have! It also makes a great geeky gift! Step 1: Materials • Empty tissue box ...
( Category:
Digital Audio, Video & Photography
January 16,2015 )
epub, pdf |eng | 2014-06-12 | Author:Simon Monk [Monk, Simon]
* * * FIGURE 5-23 Moving the LEDs closer together. Run the DRC again. You may find an error relating to the ground plane, complaining of “width.” You can ignore ...
( Category:
Electronics
January 16,2015 )
epub |eng | 2015-01-12 | Author:Roger Wiens [Wiens, Roger]
chapter fourteen CANCELED THE MSL ROVER PROJECT GOT ALONG FINE FINANCIALLY FOR the first two years. Some areas grew in cost, but the program had more than enough in reserve ...
( Category:
Astronautics & Space Flight
January 16,2015 )
epub |eng | 2013-01-14 | Author:Bob Weil & Nicki Fitz-Gerald
At this point I usually open the Notes app on my iPhone where I work on the title and any background or story that has come to mind. In the ...
( Category:
Digital
January 15,2015 )
epub |eng | 2015-01-23 | Author:Charles P. Pfleeger & Shari Lawrence Pfleeger & Jonathan Margulies [Pfleeger, Charles P.]
6.8 Intrusion Detection and Prevention Systems After the perimeter controls, firewall, and authentication and access controls block certain actions, some users are admitted to use a computing system. Most of ...
( Category:
Computers & Technology
January 15,2015 )
epub |eng | 2015-01-06 | Author:Mehmet Toy [Toy, Mehmet]
Figure 4.32. Migration to FTTH with EPoC technology. At some point in the future, perhaps when competitive pressures dictate 1 Gbps residential service offerings, cable operators can install fiber media ...
( Category:
Telecommunications & Sensors
January 14,2015 )
azw3, mobi, epub |eng | 2015-01-07 | Author:DUGGAL, PAVAN [DUGGAL, PAVAN]
o Data Security There have also been a number of security concerns that have been expressed in the context of WhatsApp. The issue is that the app uses an internally ...
( Category:
Law
January 14,2015 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14680)
The Mikado Method by Ola Ellnestam Daniel Brolund(11939)
Hello! Python by Anthony Briggs(11854)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11286)
Dependency Injection in .NET by Mark Seemann(11048)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10525)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9882)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9480)
Grails in Action by Glen Smith Peter Ledbrook(9211)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8845)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8659)
The Kubernetes Operator Framework Book by Michael Dame(8472)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8327)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8292)
Robo-Advisor with Python by Aki Ranin(8245)
Practical Computer Architecture with Python and ARM by Alan Clements(8220)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8189)
Building Low Latency Applications with C++ by Sourav Ghosh(8095)