Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Error Free Software: Know-How and Know-Why of Program Correctness (Wiley Series in Software Engineering Practice)
Error Free Software: Know-How and Know-Why of Program Correctness (Wiley Series in Software Engineering Practice)
This book is the result of an evolutionary process which took place over a number of years. The contents of this book are based on my seminar for experienced software developers, which I instruct internationally, andon courses which I have taught as an external lecturer in the Informatics Department of the Johann Wolfgang Goethe University in...
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
Multicultural Manners: Essential Rules of Etiquette for the 21st Century
Multicultural Manners: Essential Rules of Etiquette for the 21st Century
Basically, this is still a how-to book—how to get along with others who are culturally different. As before, it is not targeted just to those who travel or conduct international business. Cultural information has many applications: To help interact more effectively with new populations from East Africa, the San Diego Police Department has...
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Developing USB PC Peripherals Using Intel 8X930AX USB Microcontroller
Universal Serial Bus (USB) is one of the most important developments in PC peripheral interconnect technology since the introduction of serial and parallel ports in the early 1980's. It is fast becoming the port of choice for many new digital video conferencing cameras, scanners, monitors, PC telephony equipment, and Human Interface Devices such as...
New Computational Paradigms: Changing Conceptions of What is Computable
New Computational Paradigms: Changing Conceptions of What is Computable
In recent years, classical computability has expanded beyond its original scope to address issues related to computability and complexity in algebra, analysis, and physics. The deep interconnection between "computation" and "proof" has originated much of the most significant work in constructive mathematics and mathematical...
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Optimize Your Entire Requirements Process–and Use Requirements to Build More Successful Software

 

Using IBM® Rational® RequisitePro®, you can systematically improve the way you create and maintain requirements–and use those requirements to build...

Best Websites for Financial Professionals, Business Appraisers, and Accountants, Second Edition
Best Websites for Financial Professionals, Business Appraisers, and Accountants, Second Edition
This book is aimed primarily at the accountant or financial analyst who is engaged in consulting work—such as business appraisal, financial planning, and management consulting. The consulting area is the most rapidly growing area of accounting practice, and financial professionals in this area can benefit significantly from the increase in...
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
Crimeware: Understanding New Attacks and Defenses (Symantec Press)
“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”
Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies
Enterprise Java Development on a Budget: Leveraging Java Open Source Technologies

TODAY THE JAVA 2 PLATFORM, Enterprise Edition (J2EE) is the most complete and effective platform for enterprise development. J2EE unifies and embodies the knowledge gained from building up-to-date, multitier applications, and provides this knowledge as a standardized set of modular components and services. We believe that J2EE simplifies many...

Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
Moving Objects Databases (The Morgan Kaufmann Series in Data Management Systems)
This book represents a milestone in the synthesis of temporal and spatial database concepts and techniques. It unifies and organizes the existing research into a coherent whole and presents substantial new results and approaches in many areas. In each case it begins with what is known, then it introduces the new concepts in an abstract and...
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
The Disappearing Computer: Interaction Design, System Infrastructures and Applications for Smart Environments
“The-computer-as-we-know-it” will have no role in our future everyday lives. This is the position taken in this book which elaborates how it will be replaced by a new generation of technologies, moving computing off the desktop and ultimately integrating it with real world objects and everyday environments. Computing becomes thus an...
unlimited object storage image
Result Page: 2295 2294 2293 2292 2291 2290 2289 2288 2287 2286 2285 2284 2283 2282 2281 2280 2279 2278 2277 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy