|
|
|
|
Electronic System Level Design: An Open-Source Approach
Electronic System Level Design, or ESL Design, is generally understood as the set
of tools, methodologies and design techniques applied to modern electronic systems
design, from high-end chips and systems, to embedded devices, to integrated
hardware and software systems. Given the complexity of current systems, advanced
tools and... | | YUI 2.8 Learning the Library
The YUI Library has grown and improved since the first edition of this book. Several components came out of beta or experimental status and most of them will be covered in new chapters or added to related chapters, which will now have more than the two components originally presented.
The coding style has changed and that will be reflected... | | Linux Debugging and Performance Tuning : Tips and TechniquesThis is the definitive guide to Linux software debugging and performance optimization at both the kernel and application levels. Using extensive Linux code examples, Steve Best systematically introduces open source tools and best-practice techniques for delivering bug-free, well-tuned code.
Drawing on... |
|
|
OpenSolaris BibleAfter a beginning overview of the history of OpenSolaris, its open-source licensing, and the community development model, this book then goes on to highlight the aspects of OpenSolaris that differ from more familiar operating systems. You’ll learn how to become a power user of OpenSolaris by maximizing the abilities of advanced features like... | | Toad Pocket Reference for Oracle (Pocket Reference (O'Reilly))
Toad is an enormously popular interactive environment tool for Oracle development and administration. It allows developers to build, test, debug, and format their code via an easy-to-use graphical user interface, available in both freeware and commercial versions. Toad makes developers far more productive; using Toad, you'll find... | | Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky ... |
|
|
|
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |