Results 21 to 30 of 9,693 | « previous | next »
- Maker projects for kids who love electronics / by Kopp, Megan.;
Includes bibliographical references, Internet addresses and index.Guided reading: V.LSC
- Subjects: Electronics; Electronic circuits;
- Available copies: 1 / Total copies: 1
-
unAPI
- Bezonomics : how Amazon is changing our lives and what the world's best companies are learning from it / by Dumaine, Brian,author.;
Includes bibliographical references and index.'Bezonomics' provides an in-depth, revelatory, and unbiased look at Amazons world-dominating business model, the current competitors either imitating or trying to outfox Amazon, and the ways Bezonomics is shaping the life of every American consumer.
- Subjects: Amazon.com (Firm); Electronic commerce.; Retail trade.;
- Available copies: 1 / Total copies: 1
-
unAPI
- A beginner's guide to circuits : nine simple projects with lights, sounds, and more! / by Nydal Dahl, Øyvind,author.;
"Teaches core circuit concepts through nine graded electronics projects with complete instructions and photo references"--
- Subjects: Electronic circuits;
- Available copies: 0 / Total copies: 1
-
unAPI
- The NFT handbook : how to create, sell and buy non-fungible tokens / by Fortnow, Matt,author.; Terry, QuHarrison,author.;
The NFT Handbook is a detailed guide on how to create, sell and buy non-fungible tokens without the need for a technical background. Learn exactly what NFTs are, how they evolved, and why they have value. We'll delve into the different types and aspects of NFTs and discuss the different NFT marketplaces and the pros and cons of each. Create Your Own NFTs: Step by step instructions on all aspects of NFT creation, including what types of content to use, where to source content, adding artistic design, writing the NFT's description, adding optional unlockable content and setting an optional ongoing royalty. Mint Your NFTs: You'll learn the process of how to get your NFTs on the blockchain. Sell Your NFTs: We'll go through the whole process including creating a collection, and the different options such as setting a price or starting an auction. Buy NFTs: What you'll need to bid on and purchase NFTs, and how to avoid getting scammed. You'll also get a primer on blockchain, particularly the Ethereum cryptocurrency and "gas" fees. You'll also be shown step by step how to create, secure and fund your own cryptocurrency wallet, where you'll store your NFTs and cryptocurrency. Whether you're experienced with the blockchain and crypto or a complete noob (beginner), The NFT Handbook will guide you in the process of creating, minting, selling and buying NFTs.
- Subjects: Blockchains (Databases); Electronic commerce.; NFTs (Tokens);
- Available copies: 1 / Total copies: 1
-
unAPI
- A woman alone / by Laurin, Nina,author.;
A year after a home invasion left her traumatized, Cecelia and her family move into a new house with a complex security system that is supposed to make her feel safe. But reality proves different as strange things begin to happen and the security system reveals that the house had a prior occupant: Lydia. On her quest to discover the fate of Lydia, Cecelia uncovers metaphorical skeletons in the closet, and she realizes that no one's secrets are safe - including her own. From the author of 'Girl Last Seen'.
- Subjects: Thrillers (Fiction); Psychological fiction.; Artificial intelligence; Electronic security systems;
- Available copies: 1 / Total copies: 1
-
unAPI
- Microsoft Excel in easy steps / by McGrath, Mike,author.; Price, Michael,author.;
-
- Subjects: Microsoft Excel (Computer file); Electronic spreadsheets.;
- Available copies: 1 / Total copies: 1
-
unAPI
- Teach yourself visually Excel 2013 / by McFedries, Paul.;
-
- Subjects: Microsoft Excel (Computer file); Electronic spreadsheets;
- © c2007., Wiley Pub.,
- Available copies: 2 / Total copies: 3
-
unAPI
- 20 easy raspberry Pi projects : toys, tools, gadgets, and more! / by Santos, Rui(Writer on electronics); Santos, Sara.;
"A beginner-friendly collection of electronics projects for Raspberry Pi, suited for kids, parents, educators, and hobbyists. Each project provides step-by-step instructions, full-color photos and circuit diagrams, and the complete code"--Provided by publisher.LSC
- Subjects: Raspberry Pi (Computer);
- Available copies: 1 / Total copies: 1
-
unAPI
- NFTs for dummies / by Laurence, Tiana,author.; Kim, Seoyoung,author.;
-
- Subjects: Blockchains (Databases); Cryptocurrencies.; Electronic commerce.; NFTs (Tokens);
- Available copies: 1 / Total copies: 1
-
unAPI
- How to catch a phish : a practical guide to detecting phishing emails / by Oles, Nicholas,author.;
Learn how to detect, analyze, and respond to phishing emails, the top infection vector used by cybercriminals. The repeatable process described in this book has been cultivated and tested in real-life incidents and validated across multiple threat landscapes and environments. Every organization and individual with an email account is susceptible to deceptive emails sent by attackers with nefarious intentions. This activity, known as phishing, involves an attacker attempting to lure individuals into providing sensitive information or performing a predetermined action. Attacks vary in sophistication, but the core skills and process to detect, analyze, and respond to a suspicious message does not change. Attackers have preyed on victims with convincing and not-so-convincing phishing emails to gain initial footholds into networks around the world for over 30 years. This attack method has been rapidly growing in popularity and continues to be the number one method that organizations and individuals struggle to defend against. Regardless of what any vendor or organization will tell you, no infallible tool exists to eliminate this threat completely. This book teaches you how to analyze suspicious messages using free tools and resources. You will understand the basics of email, tactics used by attackers, and a repeatable process to systematically analyze messages and respond to suspicious activity. You Will Learn How to: Safely save email messages as attachments for analysis; Identify what information is in an email header; Review header information and extract key indicators or patterns used for detection; Identify signs of a suspicious or malicious email message; Detect the tactics that attackers use in phishing emails; Safely examine email links and attachments; Use a variety of free and simple tools to analyze email messages.
- Subjects: Electronic mail messages; Phishing;
- Available copies: 1 / Total copies: 1
-
unAPI
Results 21 to 30 of 9,693 | « previous | next »