Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Design Recipes for FPGAs
Design Recipes for FPGAs
This book provides a rich toolbox of design techniques and templates to solve practical, every-day problems using FPGAs. Using a modular structure, the book gives easy-to-find design techniques and templates at all levels, together with functional code, which engineers can easily match and apply to their application.

The easy-to-find
...
Data Modeling for Metrology and Testing in Measurement Science
Data Modeling for Metrology and Testing in Measurement Science
This book and companion DVD provide a comprehensive set of modeling methods for data and uncertainty analysis, taking readers beyond mainstream methods described in standard texts. The emphasis throughout is on techniques having a broad range of real-world applications in measurement science. Mainstream methods of data modeling and analysis...
iPhone: The Missing Manual: Covers iPhone 4 & All Other Models with iOS 4 Software
iPhone: The Missing Manual: Covers iPhone 4 & All Other Models with iOS 4 Software

With multitasking and more than a 100 other new features, iPhone 4.0 is a real treat, cooked up with Apple's traditional secret sauce of simplicity, intelligence, and whimsy. iPhone: The Missing Manual gives you a guided tour of everything the new iPhone has to offer, with lots of tips, tricks, and surprises. Learn how to...

Maximizing Your Sales with Microsoft Dynamics CRM 2011
Maximizing Your Sales with Microsoft Dynamics CRM 2011

Microsoft Dynamics CRM is a customer relationship management tool. At its very core, Microsoft Dynamics CRM is a database. It’s the place where you can enter information about your customers: Who works at the company, what are their roles, who at your company has communicated with them, what have they purchased, and have they...

Visual Studio Lightswitch 2012
Visual Studio Lightswitch 2012

LightSwitch 2012 is included as part of the Visual Studio 2012 package. It is a rapid application deployment tool that lets power users and administrators build data-centric business applications for the desktop, cloud, and Web in just a few clicks, with no code required. The basics are very easily understood but more advanced users will...

Avid Media Composer 6.x Cookbook
Avid Media Composer 6.x Cookbook

Overview:

An expert and clear resource filled with highly effective "recipes" of easy to follow steps for those at all experience levels. Gain Avid Media Composer (and Avid Symphony) essentials and far beyond, including techniques, tips, tricks,
...

More Than Enough: Claiming Space for Who You Are (No Matter What They Say)
More Than Enough: Claiming Space for Who You Are (No Matter What They Say)
INSTANT NEW YORK TIMES BESTSELLER

WINNER OF THE 2020 NAACP IMAGE AWARD FOR OUTSTANDING LITERARY WORK — BIOGRAPHY/AUTOBIOGRAPHY

NOW OPTIONED FOR DEVELOPMENT AS A TV SERIES BY PARAMOUNT TELEVISION STUDIOS AND ANONYMOUS CONTENT


“The
...
Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)
Energy and Environmental Security in Developing Countries (Advanced Sciences and Technologies for Security Applications)

This book presents a comprehensive account of the energy and environmental security perspectives of the developing countries. To address the subject comprehensively, it covers four geographically diverse clusters of developing countries from across the world. The regions particularly focused on are: South Asia, South East Asia, Sub...

Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)
Cisco® BGP-4 Command and Configuration Handbook (CCIE Professional Development)

As the means by which Internet destinations are communicated between subscribers and service providers, BGP-4 provides a critical function for Internet operations. Whether associated with Internet service providers or enterprise networks that depend heavily on the Internet, a background in BGP-4 is essential. Moving beyond...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Information Systems: Achieving Success by Avoiding Failure
Information Systems: Achieving Success by Avoiding Failure
Despite people’s best efforts information systems are particularly prone to failure. Some systems never materialize, others appear late and/or over budget and those that are implemented often fail to deliver the promised levels of performance. The consequences of these failures affect people throughout the organization concerned and beyond,...
Project Arcade: Build Your Own Arcade Machine
Project Arcade: Build Your Own Arcade Machine
This book is a culmination of five years of research into the subject of interfacing genuine arcade controls to computers. It is a polished and portable companion to the author’s Web site, the Build Your Own Arcade Controls FAQ (BYOAC), located at www.arcadecontrols.com/. Most of the research and information for this book came from the Web,...
unlimited object storage image
Result Page: 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy