Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Raspberry Pi

Buy
Hacking Raspberry Pi, 9780789751560 (0789751569), Que, 2013

 

DIY hardware hacking...easy as Pi ®!

Raspberry Pi is taking off like a rocket! You can use this amazing, dirt-cheap, credit card-sized computer to learn powerful hardware hacking techniques as you build incredibly creative and useful projects! This complete, full-color guide requires absolutely no experience with either hardware hacking or computer programming. Colorful photos guide you through each project, and the step-by-step instructions are stunningly clear and easy!

1. Start with the absolute basics:

  • Discover why millions of people are so passionate about the Pi!
  • Tour the hardware, including storage, connections, and networking
  • Install and run Raspbian, Raspberry Pi’s Linux-based operating system
  • Manage devices and configuration files
  • Network Raspberry Pi and add Wi-Fi
  • Program Raspberry Pi using Python, Scratch, XHTML, PHP, and MySQL

2. Next, build all these great projects:

  • Media Center
  • Retro Console Video Game Station
  • Minecraft Server
  • Web Server
  • Portable Webcam
  • Security & Privacy Device

3. Then, master all these cutting-edge techniques:

  • Overclock Raspberry Pi for better performance
  • Link Raspberry Pi to the Arduino and Arduino clones, including the AlaMode and the Gertboard
  • Use the Pi to build electronics prototypes using a breadboard
(HTML tags aren't allowed.)

Environment Learning for Indoor Mobile Robots: A Stochastic State Estimation Approach to Simultaneous Localization and Map Building
Environment Learning for Indoor Mobile Robots: A Stochastic State Estimation Approach to Simultaneous Localization and Map Building
This monograph covers theoretical aspects of simultaneous localization and map building for mobile robots, such as estimation stability, nonlinear models for the propagation of uncertainties, temporal landmark compatibility, as well as issues pertaining the coupling of control and SLAM. One of the most relevant topics covered in this monograph is...
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework
Wireshark for Security Professionals: Using Wireshark and the Metasploit Framework

Master Wireshark to solve real-world security problems

If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...

Security + Exam Guide (Testtaker's Guide Series)
Security + Exam Guide (Testtaker's Guide Series)

The Security+ Exam Guide provides exam candidates with the concepts, objectives, and test-taking skills needed to pass on their first attempt. Instead of covering every computer security topic, this book isolates those topics most likely to be addressed on the exam. Written by an experienced network administrator and CompTIA...


Principles of Electrochemistry
Principles of Electrochemistry
Presents electron transfer and double-layer theories in an understandable manner while keeping mathematics to a minimum. Revised and expanded, this edition features a number of new sections which deal with electrochemical materials science, photoelectrochemistry, stochastic processes, novel aspects of ion transfer across biological membranes,...
WLAN Positioning Systems: Principles and Applications in Location-Based Services
WLAN Positioning Systems: Principles and Applications in Location-Based Services

Describing the relevant detection and estimation theory, this detailed guide provides the background knowledge needed to tackle the design of practical WLAN positioning systems. It sets out key system-level challenges and design considerations in increasing positioning accuracy and reducing computational complexity, and it also examines...

Data Protection
Data Protection
At first sight, Data Protection may not appear to affect the library professional unduly. The 1998 Data Protection Act only applies to information about people. Most of the material held in a typical library will not be covered.

But this first impression would be wrong. Librarians deal with people every day. They hold information about
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy