Like most interesting subjects, assembly language programming requires a little
background knowledge before you can start to appreciate it. In this chapter, we explore
these basics. If terms such as two's complement, hexadecimal, index register and byte are...
Information technology is an increasingly large factor in legal proceedings. In cases large and small, from the U.S. Government's antitrust suit against Microsoft Corporation, to civil lawsuits filed over the failure of a network, to criminal cases in which the authenticity of electronic evidence is questioned, the testimony of a technical...
The Inquisition played a central role in European history. It moulded societies by enforcing religious and intellectual unity; it helped develop the judicial and police techniques which are the basis of those used today; and it helped lay the foundations for the persecution of witches. An understanding of the Inquisition is therefore...
OpenCL (Open Computing Language) is the first royalty-free standard for cross platform, parallel programming of modern processors found in personal computers, servers, mobiles, and embedded devices. OpenCL greatly improves speed and responsiveness for a wide spectrum of applications in numerous market categories, from gaming and entertainment...
Need some inspiration for your Raspberry Pi projects? Wondering how to work with Wii nunchucks, stepper motors, how to create a remote control panel? If you need guidance, Experimenting with Raspberry Pi is your own personal idea generator. Experimenting with Raspberry Pi covers how to work with various components and...
* Artificial vision system that uses a CCD camera to track and follow brightly colored objects * Bi-pedal robots that walk upright * Functional robotic arm * Easily programmed behavior-based robots * Complete parts...
The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...
Designing for Windows 8 is a fast-paced, 150-page primer on the key design concepts you need to create successful Windows 8 apps. This book will help you design a user interface that is both delightful and effective, feels ‘right’ to your users, and encapsulates a great Windows 8 experience.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Create high-tech walking, talking, and thinking robots
This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...