A fully updated guide to quickly and easily programming ArduinoThoroughly revised for the new Arduino Uno R3, this bestselling guide explains how to write well-crafted sketches using Arduino s modified C language.
The Definitive Java Programming GuideFully updated for Java SE 17, Java : The Complete Reference, Twelfth Edition explains how to develop, compile, debug, and run Java programs.
An updated guide to programming your own Raspberry Pi projectsLearn to create inventive programs and fun games on your powerful Raspberry Pi with no programming experience required.
Build secure IoT devices and networks for a wide range of industries This practical guide fully explains the technology behind the Internet of Things, machine-to-machine communication, and automation.
Master the Powerful Multitenant Features of Oracle Database 12cGovern a scalable, extensible, and highly available enterprise database environment using the practical information contained in this Oracle Press guide.
Up-to-Date Coverage of Microsoft(R) SQL Server(R) 2016 Reporting Services, Including the Mobile Report PublisherBuild, publish, and maintain paginated and mobile reports using the expert tips and best practices contained in this hands-on guide.
Get up and running on the latest JavaScript standard using this fully updated beginner's guideThis hands-on, fast-paced guide shows, from start to finish, how to create dynamic Web pages complete with special effects using JavaScript.
Go beyond the basics with this up to date Arduino programming resourceTake your Arduino programming skills to the next level using the hands-on information contained in this thoroughly revised, easy to follow TAB guide.
Cutting-edge cybersecurity solutions to defend against the most sophisticated attacksThis professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget.
Expanded into two volumes, the Second Edition of Springer's Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security.
Learn the value that OpenTelemetry can bring to organizations that aim to implement observability best practices, and gain a deeper understanding of how different building blocks interact with each other to bring out-of-the-box, vendor-neutral instrumentation to your stack.
Information Systems Development: Business Systems and Services: Modeling and Development, is the collected proceedings of the 19th International Conference on Information Systems Development held in Prague, Czech Republic, August 25 - 27, 2010.
This volume looks at the forms and functions of counterspeech as well as what determines its effectiveness and success from multidisciplinary perspectives.
This book considers the four essential cores of game design: Mechanics, the interactive elements that allow players to be part and interact with the game itself; Economy, the resources and numerical concepts that will enable players to evaluate and consider the options in the game, creating strategy, risk, and fun; Narrative, the textual features that enable players to create and generate meaning for the game and its parts; and the Aesthetics, the audiovisual elements that allow players to experience the game through their senses and feelings.
Software Development with C++: Maximizing Reuse with Object Technology is about software development and object-oriented technology (OT), with applications implemented in C++.
Object-Oriented Analysis and Design provides a thorough grounding in object-oriented concepts, the software development process, UML and multi-tier technologies.
This comprehensive approach to the creation of software systems charts a road through system modelling techniques, allowing software engineers to create software meeting two very basic requirements:* that the software system represent a narrow emulation of the organization system that served as its model; * and that the software system display life attributes identical to those of the organization system that it automatizes.
Discover the RESTful technologies, including REST, JSON, XML, JAX-RS web services, SOAP and more, for building today's microservices, big data applications, and web service applications.
This in-depth look at the encryption tools available in SQL Server shows you how to protect data by encrypting it at rest with Transparent Data Encryption (TDE) and in transit with Transport Level Security (TLS).
This condensed syntax reference presents the essential Excel function syntax in a well-organized format that can be used as a quick and handy reference.
Quickly find solutions to dozens of common programming problems encountered while building Java applications, with recipes presented in the popular problem-solution format.