Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of Multicore Software Development (Chapman & Hall/CRC Computational Science)
Fundamentals of Multicore Software Development (Chapman & Hall/CRC Computational Science)

With multicore processors now in every computer, server, and embedded device, the need for cost-effective, reliable parallel software has never been greater. By explaining key aspects of multicore programming, Fundamentals of Multicore Software Development helps software engineers understand parallel programming and master...

Wirelessness: Radical Empiricism in Network Cultures
Wirelessness: Radical Empiricism in Network Cultures

Motion, to take a good example, is originally a turbid sensation, of which the native shape is perhaps best preserved in the phenomenon of vertigo. (James 1996a, 62)

Between 1999 and 2009, a “ turbid ” or disordered sensation of change was felt as wireless connections expanded and eroded the edges of the Internet...

Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)
Power Analysis Attacks: Revealing the Secrets of Smart Cards (Advances in Information Security)

Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance.

Power Analysis Attacks: Revealing the...

Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Deep Belief Nets in C++ and CUDA C: Volume 1: Restricted Boltzmann Machines and Supervised Feedforward Networks
Discover the essential building blocks of the most common forms of deep belief networks. At each step this book provides intuitive motivation, a summary of the most important equations relevant to the topic, and concludes with highly commented code for threaded computation on modern CPUs as well as massive parallel processing on computers...
CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

IBM Sametime 8.5.2 Administration Guide
IBM Sametime 8.5.2 Administration Guide
Allow me to be the first to congratulate you for purchasing this book. Sametime 8.5 is a very different product from previous versions of the product. What once was a simple offering that provided secure instant messaging with some web conferencing capabilities has now evolved into a robust, flexible, sophisticated communications...
Heuristic Search: Theory and Applications
Heuristic Search: Theory and Applications

Search has been vital to artificial intelligence from the very beginning as a core technique in problem solving. The authors present a thorough overview of heuristic search with a balance of discussion between theoretical analysis and efficient implementation and application to real-world problems. Current developments in search such as...

Critical Thinking: An Appeal to Reason
Critical Thinking: An Appeal to Reason

In Critical Thinking: An Appeal to Reason, Peg Tittle empowers students with a solid grounding in the lifelong skills of considered analysis and argumentation that should underpin every student’s education. Starting with the building blocks of a good argument, this comprehensive new textbook offers a full...

Securing SQL Server: Protecting Your Database from Attackers
Securing SQL Server: Protecting Your Database from Attackers

As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...

Creating Mobile Apps with Sencha Touch 2
Creating Mobile Apps with Sencha Touch 2

If you have basic to intermediate knowledge of Sencha Touch, this tutorial will give you a deep insight into its full capabilities when creating mobile apps. Learn the language through building ten unique applications.

Overview

  • Learn the Sencha Touch programming language by building real, working...
Build the Ultimate Custom PC
Build the Ultimate Custom PC

Take control of your PC!

Why do they load up a PC with stuff you don't need and leave off the things you really want? Don't take it anymore! Grab a screwdriver and let these two experts show you how to build the PC of your dreams, even if you've never cracked a case before. You'll learn to choose...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy