Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Electronics Cookbook: Practical Electronic Recipes with Arduino and Raspberry Pi

Buy

If you’re among the many hobbyists and designers who came to electronics through Arduino and Raspberry Pi, this cookbook will help you learn and apply the basics of electrical engineering without the need for an EE degree. Through a series of practical recipes, you’ll learn how to solve specific problems while diving into as much or as little theory as you’re comfortable with.

Author Simon Monk (Raspberry Pi Cookbook) breaks down this complex subject into several topics, from using the right transistor to building and testing projects and prototypes. With this book, you can quickly search electronics topics and go straight to the recipe you need. It also serves as an ideal reference for experienced electronics makers.

This cookbook includes:

  • Theoretical concepts such as Ohm’s law and the relationship between power, voltage, and current
  • The fundamental use of resistors, capacitors and inductors, diodes, transistors and integrated circuits, and switches and relays
  • Recipes on power, sensors and motors, integrated circuits, and radio frequency for designing electronic circuits and devices
  • Advice on using Arduino and Raspberry Pi in electronics projects
  • How to build and use tools, including multimeters, oscilloscopes, simulations software, and unsoldered prototypes
(HTML tags aren't allowed.)

NTP Security: A Quick-Start Guide
NTP Security: A Quick-Start Guide

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline.

NTP Security: A Quick-Start...

Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Python Recipes Handbook: A Problem-Solution Approach
Python Recipes Handbook: A Problem-Solution Approach

Learn the code to write algorithms, numerical computations, data analysis and much more using the Python language: look up and re-use the recipes for your own Python coding. This book is your handy code cookbook reference. Whether you're a maker, game developer, cloud computing programmer and more, this is a must-have reference for your...


TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Docker Cookbook: Solutions and Examples for Building Distributed Applications
Docker Cookbook: Solutions and Examples for Building Distributed Applications

Whether you’re deploying applications on premise or in the cloud, this cookbook provides developers, operators, and IT professionals with more than 130 proven recipes for working with Docker.

With these practical solutions, experienced developers with no previous knowledge of Docker will be able to package and...

Advanced Penetration Testing for Highly-Secured Environments - Second Edition
Advanced Penetration Testing for Highly-Secured Environments - Second Edition

Employ the most advanced pentesting techniques and tools to build highly-secured systems and environments

About This Book

  • Learn how to build your own pentesting lab environment to practice advanced techniques
  • Customize your own scripts, and learn methods to exploit 32-bit and 64-bit...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy