 |
|
 Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded SystemsA new approach to the study of arithmetic circuits
In Synthesis of Arithmetic Circuits: FPGA, ASIC and Embedded Systems, the authors take a novel approach of presenting methods and examples for the synthesis of arithmetic circuits that better reflects the needs of today's computer system designers and engineers.... |  |  Visual Basic 2005 Cookbook: Solutions for VB 2005 Programmers (Cookbooks)This book will help you solve more than 300 of the most common and not-so-common tasks that working Visual Basic 2005 programmers face every day. If you're a seasoned .NET developer, beginning Visual Basic programmer, or a developer seeking a simple and clear migration path from VB6 to Visual Basic 2005, the ... |  |  Microsoft Visual Basic .NET Programmer's CookbookFilled with the ingredients developers need--code samples, instructions, and solutions to common problems--this book is the logical place for developers to start building projects and learning more about Visual Basic .NET.
Next time you hit the wall with a tough Visual Basic .NET problem, get the code behind the... |
|
|
|
 Beginning J2ME: From Novice to Professional, Third EditionJ2ME is a platform for wireless and mobile Java application development. Beginning J2ME makes this and all the fun you can have with it accessible to the first time wireless Java developer as well as useful to the experienced. This book includes coverage such as sound HTTPS support, lots of user interface API enhancements, a Game API,... |  |  Computer Science Handbook, Second Edition
The second edition of this elemental handbook reviews the current state of theory and practice in the field while emphasizing a more practical/applied approach to IT topics such as information management, net-centric computing, and human computer interaction. With a complete revision of its sections on software engineering, architecture, and... |  |  Fundamentals of Cryptology: A Professional Reference and Interactive TutorialThe protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g.... |
|
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 |