Hardware
Elektronika z wykorzystaniem Arduino i Rapsberry Pi. Receptury
Simon Monk
Praktyczne przepisy rozwiązań elektronicznych z wykorzystaniem Arduino i Raspberry Pi Aby zacząć zajmować się elektroniką, wcale nie trzeba być inżynierem w tej dziedzinie. Dzięki powszechnie dostępnym i niedrogim podzespołom, wielu źródłom wiedzy i inspiracji oraz chętnej do pomocy społeczności elektronika staje się ulubionym hobby rosnącej rzeszy osób. Wiele z nich staje się profesjonalistami, tworząc pomysłowe i przydatne konstrukcje. Naturalnie nie oznacza to, że dziedzina ta stała się zupełnie bezproblemową zabawą: elektronik powinien mieć pewną wiedzę teoretyczną i umieć rozwiązywać określone, specyficzne dla elektroniki problemy. Niniejsza książka jest solidnym punktem wyjścia dla elektroników amatorów i osób pragnących zająć się tą dziedziną profesjonalnie. Szczególnie ważnym elementem książki jest omówienie podstaw elektroniki oraz zagadnień stosowania mikrokontrolerów, tworzenia zasilaczy różnego rodzaju, używania odpowiednich tranzystorów do różnych celów, stosowania analogowych i cyfrowych układów scalonych, a także budowania projektów i prototypów oraz posługiwania się sprzętem badawczym. Książkę zorganizowano w ten sposób, aby ułatwić szybkie odnalezienie potrzebnego zagadnienia i skorzystanie z odpowiedniego przepisu. W tej książce znajdziesz takie tematy, jak: zagadnienia teoretyczne i komponenty elektroniczne zasilanie: baterie, akumulatory i panele słoneczne sterowanie za pomocą Arduino i Raspberry Pi rozwiązania analogowe częstotliwości radiowe i przekazywanie pakietów danych korzystanie z narzędzi i urządzeń warsztatowych Zbiór receptur na każdy dzień elektronika!
Cash Costello
As an updated version of the first ever Elgg book, this is an excellent resource for those interested in Elgg development due to its attention to detail, clearly written style and knowledgeable author. - Dave Tosh, Elgg co-founder.In his book, Cash Costello makes full use of his skills in development and communication to tackle the complex subject of Elgg social networking. This easy-to-read guide gives end users, new developers, and old pros alike a solid base to start their venture into social media with Elgg. I highly recommend it as a useful and enjoyable read.- Brett Profitt, Elgg Lead DeveloperThe web is becoming increasingly social as millions of people use it to blog, share, post, 'friend', 'unfriend' (which was made the Oxford word of the year in 2009), comment, and chat. Elgg ñ your award-winning open source social networking engine ñ is tailor-made to create any social networking or social media website you can imagine.If you want to create a social networking website from scratch using Elgg, then this book is exactly what you need.Elgg 1.8 Social Networking covers everything you need to know about building a social networking site with Elgg. It begins with instructions for installing Elgg, continues with a guided tour of its capabilities, and finishes with practical advice on deploying Elgg on a production server. And in between, it is packed with information on configuring and customizing Elgg through plugins and themes.This book is a learn-by-doing guide to creating your own social networking site. It includes three sample case studies on how Elgg could be used as an e-learning tool, an intranet application for organizations, and a niche social networking site. Step by step it takes you through the installation, configuration, and customization of Elgg. Valuable advice is sprinkled throughout the book to enable you to build your site like an expert.For developers, this book provides a multitude of options. First, there is a tutorial-based section that systematically teaches you how to build plugins. Soon you will have ten plugins for use on your site in addition to all the knowledge you have gained. Second, if you prefer a quick overview, this book has an appendix that describes Elgg using the terminology and design patterns common in web development. Third, if you are interested in creating a theme, it also includes a design tutorial and a catalog of Elgg's view templates.The book then goes on to describe what is involved in running a production website. It has sections on selecting a hosting provider, configuring and tuning the server, backing up the site, and dealing with spammers.
Mohammed Billoo
Embedded Linux now powers everything from IoT devices to industrial systems, making it essential for embedded software engineers to be skilled at customizing, deploying, and developing for these platforms. This hands-on guide walks you through the core concepts of Embedded Linux using practical, real-world examples on Raspberry Pi 4 and 5. For those without access to hardware, it also demonstrates how to simulate embedded Linux systems using QEMU.This book contains code samples that you can follow along and build three real-world projects: a Python web-based dashboard that retrieves and displays data from a temperature sensor and two GUI applications demonstrating how to use the Qt framework on Embedded Linux using two different development paradigms. You’ll also step into advanced territory with Linux kernel debugging techniques and discover how to harness eBPF, building the experience employers want and the confidence to tackle complex embedded challenges.By the end of this book, you'll have a solid grasp of Embedded Linux development and the skills to build and deploy production-ready, modern embedded applications.
Spencer Harbar, Lim Mei Ying, Stefan Gossner
The release of Microsoft Content Management Server (MCMS) Service Pack 2 opens up the world of ASP.NET 2.0 to MCMS developers. Written by the masters of MCMS, this book shows you how to use the new features of ASP.NET 2.0 that everyone is talking about in your MCMS development.You will first learn how to install and configure MCMS SP2. There are two approaches to setting up a development environment for SP2: an upgrade from a previous SP1a installation or starting from scratch and building a fresh installation including SP2. Of course, both approaches are covered.You will become familiar with the MCMS Service Pack 2 development environment, and create custom Visual Studio 2005 templates to overcome some of the issues which are present with the templates shipped with MCMS SP2.After that, its time to look at some of the most exciting features of ASP.NET 2.0, and how you can make use of them in MCMS: master pages, site navigation, themes, and the membership provider model.One of the coolest features introduced with ASP.NET 2.0 is master pages, which allow developers to enforce common layout and behaviour across pages within an application. You will learn about the benefits of using master pages and see a step-by-step guide for implementing them in your MCMS applications, where they become master templates!ASP.NET 2.0 introduces a whole new way of implementing site navigation, driven by site maps. By programmatically adding channels and postings to a site map you will see how to smoothly integrate these controls to any MCMS site.To customize the look of your site, we will see how a common look and feel can be applied efficiently to a MCMS site by using ASP.NET 2.0 themes. An essential customization required for themes to work correctly in an MCMS site is a must-read feature of this chapter.MCMS has its own role based authorization and user management system which cannot be extended. However, the new ASP.NET 2.0 Membership Provider Model and the shipped controls can be used within MCMS applications to improve the implementation of Forms Authentication and provide a more elegant solution for authenticating against an external store.A collection of tips and tricks round off the book, including using the Provider Model design pattern to ease migration to Office SharePoint Portal Server
Damien Bruyndonckx
Looking to deliver scalable online learning solutions? Adobe's latest enterprise Learning Manager is a powerful learning management system (LMS) that enables organizations to deliver, manage, and track immersive learning experiences. This book unlocks the full potential of Learning Manager, guiding you to become an adept administrator, author, or teacher, experimenting with Learning Manager from different perspectives. You'll gain an in-depth understanding of the features and their impact on your business. From platform setup to course administration, you’ll be able to create blended learning experiences, deploy your content to different devices, and explore Learning Manager's features for monitoring your students' progress on a daily basis. Finally, you'll discover techniques for organizing and maintaining your course catalog while elevating the learner experience. By the end of the book, you’ll be able to implement your organization’s training strategy, deliver engaging learning experiences, and generate meaningful reports to monitor their effectiveness.
Aaron Woody
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.Enterprise Security: A Data-Centric Approach to Securing the Enterprise will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD. Enterprise Security: A Data-Centric Approach to Securing the Enterprise will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security. This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.
Joydip Kanjilal
The ADO.NET Entity Framework from Microsoft is a new ADO.NET development framework that provides a level of abstraction for data access strategies and solves the impedance mismatch issues that exist between different data modelsThis book explores Microsoft’s Entity Framework and explains how it can used to build enterprise level applications. It will also teach you how you can work with RESTful Services and Google’s Protocol Buffers with Entity Framework and WCF. You will explore how to use Entity Framework with ASP.NET Web API and also how to consume the data exposed by Entity Framework from client applications of varying types, i.e., ASP.NET MVC, WPF and Silverlight. You will familiarize yourself with the new features and improvements introduced in Entity Framework including enhanced POCO support, template-based code generation, tooling consolidation and connection resiliency. By the end of the book, you will be able to successfully extend the new functionalities of Entity framework into your project.
Kevin Wilson
You'll begin this course with basic computer fundamentals, setting the foundation for critical hardware components that power every computing device. From motherboards to processors, you'll gain a solid understanding of how these elements work together to create a functioning computer.As you progress, you'll uncover the importance of peripheral devices, discovering how external components interact with the core hardware. The course also covers the diverse types of computers, ranging from personal desktops to powerful servers, and guides you in interpreting hardware specifications to make informed decisions when purchasing or upgrading equipment. The course continues with an introduction to computer software, focusing on the relationship between hardware & the programs that bring them to life.In the final stages, the course shifts its focus to computer networks and the internet, offering insights into how devices connect and communicate on a global scale. You'll explore the essential principles of internet security, learning how to protect your devices and data from online threats. By the end of this course, you'll have a well-rounded understanding of both the physical and digital aspects of computing, empowering you to navigate the technological landscape with confidence.
Kevin Wilson
You'll begin this course with basic computer fundamentals, setting the foundation for critical hardware components that power every computing device. From motherboards to processors, you'll gain a solid understanding of how these elements work together to create a functioning computer.As you progress, you'll uncover the importance of peripheral devices, discovering how external components interact with the core hardware. The course also covers the diverse types of computers, ranging from personal desktops to powerful servers, and guides you in interpreting hardware specifications to make informed decisions when purchasing or upgrading equipment. The course continues with an introduction to computer software, focusing on the relationship between hardware & the programs that bring them to life.In the final stages, the course shifts its focus to computer networks and the internet, offering insights into how devices connect and communicate on a global scale. You'll explore the essential principles of internet security, learning how to protect your devices and data from online threats. By the end of this course, you'll have a well-rounded understanding of both the physical and digital aspects of computing, empowering you to navigate the technological landscape with confidence.