Home | Amazing | Today | Tags | Publishers | Years | Search 
Building Parallel, Embedded, and Real-Time Applications with Ada
Building Parallel, Embedded, and Real-Time Applications with Ada

The arrival and popularity of multi-core processors have sparked a renewed interest in the development of parallel programs. Similarly, the availability of low cost microprocessors and sensors has generated a great interest in embedded real-time programs. This book provides students and programmers with traditional backgrounds in...

Error Correction Codes for Non-Volatile Memories
Error Correction Codes for Non-Volatile Memories

Nowadays it is hard to find an electronic device which does not use codes: for example, we listen to music via heavily encoded audio CD's and we watch movies via encoded DVD's. There is at least one area where the use of encoding/decoding is not so developed, yet: Flash non-volatile memories. Flash memory high-density, low power, cost...

Enterprise Service Computing: From Concept to Deployment
Enterprise Service Computing: From Concept to Deployment

The developed economy is shifting from being manufacturing based to services based. Different from the traditional manufacturing business, the services business is more complicated and dynamic, and end-user driven rather than product driven. To stay competitive, an enterprise thus has to rethink its business strategies and revamp its...

Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)

Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.

The Information Security...

ULSI Technology
ULSI Technology

ULSI Technology describes the theoretical and practical aspects of the most advanced state of electronics technology-ultralarge-scale integration (ULSI), where an integrated circuit (IC) chip contains over 10 million semiconductor devices. With ULSI technology, the cost of electronics products will decrease while the system functionality and...

Oracle Coherence 3.5
Oracle Coherence 3.5

Scalability, performance, and reliability have to be designed into an application from the very beginning, as there may be substantial cost or implementation consequences if they need to be added down the line. This indispensible book will teach you how to achieve these things using Oracle Coherence, a leading data grid product on the...

BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)
BizTalk 2010 Recipes: A Problem-Solution Approach (Expert's Voice in BizTalk)

By the time you’re reading this in a bookstore, BizTalk will have celebrated its tenth birthday. Over the past decade, there have been seven releases of Microsoft’s enterprise integration server, and it has become the most broadly deployed integration middleware technology in the industry, with over 10,000 customers worldwide....

Electronic and Algorithmic Trading Technology: The Complete Guide
Electronic and Algorithmic Trading Technology: The Complete Guide

Electronic and algorithmic trading has become part of a mainstream response to buy-side traders' need to move large blocks of shares with minimum market impact in today's complex institutional trading environment. This book illustrates an overview of key providers in the marketplace. With electronic trading platforms becoming...

Building the Perfect PC
Building the Perfect PC

Build a PC that will outperform any brand-name box on the market

Yes, even if you’re not a total geek you can build your own PC -- and we guarantee it’s worth the effort. You’ll discover that the quality is better and the cost is much lower than any comparable off-the-shelf PC you can buy. Design...

Easy To Understand Guide Hom Com
Easy To Understand Guide Hom Com

TO MANY PEOPLE, the word "computer" is a kind of future shock - an image of huge, intimidating machines banked in specially climate-controlled rooms, deep in corporate America. The people who use them, we think, are an elite group - far from ordinary people, hunched over their glowing video screens like sorcerers bending over a...

Up and Running with Autodesk Inventor Simulation 2011, Second Edition: A step-by-step guide to engineering design solutions
Up and Running with Autodesk Inventor Simulation 2011, Second Edition: A step-by-step guide to engineering design solutions

Autodesk® Inventor® Simulation is an essential element in the Autodesk Digital Prototyping workflow that enables engineers, designers and manufacturers to transition from traditional design and physical prototyping methods to the innovative use of 3D modeling for evaluating form, fit and function. This...

Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

Result Page: 137 136 135 134 133 132 131 130 129 128 127 126 125 124 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy