 |
|
 Basic Engineering Circuit Analysis
Basic Engineering Circuit Analysis, Ninth Edition maintains its student friendly, accessible approach to circuit analysis and now includes even more features to engage and motivate students. In addition to brand new exciting chapter openers, all new accompanying photos are included to help engage visual... |  |  Photoshop CS5: Top 100 Simplified Tips and Tricks
Intermediate-level users learn to coax much more from Photoshop
Photoshop is the preferred image-editing software, with more than four million users worldwide. Professional photographers, Web designers, graphic designers, and serious photo hobbyists who already know earlier versions of Photoshop will expand their skills by... |  |  Fundamentals of Telecommunications
Demystifying the technology of telecommunications: a guided tour for the non-engineer
This book provides an easy-to-understand introduction to the complex technical world of telecommunications. From bandwidth to data transfer protocol to PSTN, ISDN, PCS, or ATM-widely respected telecommunications expert and author Roger L.... |
|
|
 VHDL 101: Everything you need to know to get started
VHDL (VHSIC Hardware Description Language) is a hardware programming language commonly used for FPGA (Field Programable Gate Array) or ASIC (Application Specific Integrated Circuit) designs. FPGAs and the like are often found within larger applications such as cell phones, medical imagers, and personal media devices. As these devices are... |  |  Data Management and Query Processing in Semantic Web Databases
The Semantic Web, which is intended to establish a machine-understandable Web, is currently changing from being an emerging trend to a technology used in complex real-world applications. A number of standards and techniques have been developed by the World Wide Web Consortium (W3C), e.g., the Resource Description Framework (RDF), which... |  |  Encyclopedia of Cryptology
Secret writing for the transmission of messages has been practiced for nearly 4,000 years. According to David Kahn, the great historian of cryptology, the first example of an intentionally altered message can be traced to a tomb in ancient Egypt dated about 1900 b.c. In the 40 centuries since that... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |