Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Assembly Language Programming: ARM Cortex-M3
Assembly Language Programming: ARM Cortex-M3

ARM designs the cores of microcontrollers which equip most "embedded systems" based on 32-bit processors. Cortex M3 is one of these designs, recently developed by ARM with microcontroller applications in mind. To conceive a particularly optimized piece of software (as is often the case in the world of embedded systems) it...

Algorithm Design: Foundations, Analysis and Internet Examples
Algorithm Design: Foundations, Analysis and Internet Examples
This book is designed to provide a comprehensive introduction to the design and analysis of computer algorithms and data structures. In terms M the computer science and computer engineering curricula, we have written this book to be primarily focused on the Junior-Senior level Algorithms (CS7) course, which is taught as a...
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art and Science of NFC Programming (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
Even if the NFC standard is young (developed in 2004), I have been asked to write this book for several years now, due to the pioneering role played in France (and in Europe) by our Computer Science Master’s degree MBDS (www.mbds-fr.org) at the University of Nice – Sophia-Antipolis around the prototyping of innovative...
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)
The Cyber Risk Handbook: Creating and Measuring Effective Cybersecurity Capabilities (Wiley Finance)

Actionable guidance and expert perspective for real-world cybersecurity

The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The first resource of its kind, this book provides authoritative guidance for real-world...

Cybersecurity Law
Cybersecurity Law

A definitive guide to cybersecurity law

Expanding on the author’s experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information...

Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence
Investigating Cryptocurrencies: Understanding, Extracting, and Analyzing Blockchain Evidence

Investigate crimes involving cryptocurrencies and other blockchain technologies

Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their...

Data Structures and Algorithms in Java
Data Structures and Algorithms in Java

The design and analysis of efficient data structures has long been recognized as a key component of the Computer Science curriculum. Goodrich, Tomassia and Goldwasser's approach to this classic topic is based on the object-oriented paradigm as the framework of choice for the design of data structures. For each ADT presented in the text,...

Fundamental Nursing Skills
Fundamental Nursing Skills

Providing forward-thinking approaches and ideas for nurses of all categories, this reference has been written primarily in response to increasing concerns regarding the perceived lack of ability in both students and newly qualified nurses to perform clinical skills.

By outlining the elements of essential nursing procedure in a...

Data Structures: Abstraction and Design Using Java, 3rd edition
Data Structures: Abstraction and Design Using Java, 3rd edition

Our goal in writing this book was to combine a strong emphasis on problem solving and software design with the study of data structures. To this end, we discuss applications of each data structure to motivate its study. After providing the specification (interface) and the implementation (a Java class), we then cover case studies that use the...

Exploring Arduino: Tools and Techniques for Engineering Wizardry
Exploring Arduino: Tools and Techniques for Engineering Wizardry

Learn to easily build gadgets, gizmos, robots, and more using Arduino

Written by Arduino expert Jeremy Blum, this unique book uses the popular Arduino microcontroller platform as an instrument to teach you about topics in electrical engineering, programming, and human-computer interaction. Whether you're a budding...

Children's Respiratory Nursing
Children's Respiratory Nursing

Children's Respiratory Nursing is a comprehensive, patient-centred text providing up-to-date information about the contemporary management of children with respiratory conditions. It looks at acute and chronic respiratory conditions in both primary and secondary health care sectors and explores the subject from a child- and...

Hyperspectral Data Processing: Algorithm Design and Analysis
Hyperspectral Data Processing: Algorithm Design and Analysis

Hyperspectral Data Processing: Algorithm Design and Analysis is a culmination of the research conducted in the Remote Sensing Signal and Image Processing Laboratory (RSSIPL) at the University of Maryland, Baltimore County. Specifically, it treats hyperspectral image processing and hyperspectral signal processing as separate subjects in...

Result Page: 314 313 312 311 310 309 308 307 306 305 304 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy