|
|
|
|
|
System-on-a-Chip Verification - Methodology and TechniquesSystem-On-a-Chip Verification: Methodology and Techniques is the first book to cover verification strategies and methodologies for SOC verification from system level verification to the design sign- off. The topics covered include Introduction to the SOC design and verification aspects, System level verification in brief, Block level... | | Mobilized Marketing and the Consumer: Technological Developments and Challenges
Mobilized Marketing and the Consumer: Technological Developments and Challenges explores technological developments and widespread issues concerning the explosion of mobile devices in the information age. Providing breakthrough research on topics such as Bluetooth, mobile phones, and online portals, this innovative publication... | | iOS Game Programming Cookbook
Over 45 interesting game recipes that will help you create your next enthralling game
About This Book
-
Learn to create 2D graphics with Sprite Kit, game physics, AI behaviours, 3D game programming, and multiplayer gaming
-
Use native iOS frameworks for OpenGL to create 3D textures, allowing...
|
|
Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.
Personal Cybersecurity addresses the needs of individual users at work and at home. This book... | | Wireless HacksThe popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwide communicate via radio waves every day, cutting the tethers of the cabled network both at home and at work.
... | | Wireless Communications: Principles and Practice (2nd Edition)The indispensable guide to wireless communications—now fully revised and updated!
Wireless Communications: Principles and Practice, Second Edition is the definitive modern text for wireless communications technology and system design. Building on his classic first edition, Theodore S. Rappaport covers the fundamental... |
|
Mac OS X Leopard: Beyond the ManualMac OS X is quickly becoming one of the most popular operating systems for power users. Mac OS X’s ability to mesh an easy-to-use and attractive interface with a Unix back end has attracted average and power users to the Mac. In 2007, Apple releases the next version of Mac OS X: Leopard.
Mac OS X Leopard: Beyond the Manual is... | | Wireless and Mobile Networks Security
This book provides a thorough examination and analysis of cutting-edge research and security solutions in wireless and mobile networks. It begins with coverage of the basic security concepts and fundamentals which underpin and provide the knowledge necessary for understanding and evaluating security issues, challenges, and solutions. This... | | Beacon Technologies: The Hitchhiker's Guide to the Beacosystem
Learn the key standardsâiBeacon, Eddystone, Bluetooth 4.0, and AltBeaconâand how they work with other proximity technologies. Then build your understanding of the proximity framework and how to identify and deploy the best solutions for your own business, institutional, or consulting needs.
Proximity technologyâin... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 |