Home | Amazing | Today | Tags | Publishers | Years | Search 
FPGAs 101: Everything you need to know to get started
FPGAs 101: Everything you need to know to get started

FPGAs (Field-Programmable Gate Arrays) can be found in applications such as smart phones, mp3 players, medical imaging devices, and for aerospace and defense technology. FPGAs consist of logic blocks and programmable interconnects. This allows an engineer to start with a blank slate and program the FPGA for a specific task, for instance,...

Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age

With their ability to cross traditional boundaries and achieve a level of functionality greater than their component elements, mega-systems have helped corporations and government organizations around the world resolve complex challenges that they otherwise couldn’t address with stand-alone systems. Engineering Mega-Systems: The...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Fiber Optic Sensors (Optical Science and Engineering)
Fiber Optic Sensors (Optical Science and Engineering)

This reference presents a comprehensive account of the recent advances and research in fiber optic sensor technology. It offers a progressive history of each sensor type as well as basic principles and fundamental building blocks for practical applications in the electrical aerospace, defense and manufacturing, smart structure, undersea...

Transforming Enterprise Cloud Services
Transforming Enterprise Cloud Services

Transforming Enterprise Cloud Services addresses the fundamental ideology of Cloud Services and how enterprises in commercial, federal, and defense industries can transform their current information technology and management models to adopt this new method. It goes beyond the mere description of service frameworks in relation to...

Hardening Cisco Routers (O'Reilly Networking)
Hardening Cisco Routers (O'Reilly Networking)

Master one single topic, and everything becomes clearer.

The field of network security is a huge subject. To be a network security expert, you must be an expert on routers, switches, hubs, firewalls, intrusion detection systems (IDS), servers, desktops, email, HTTP, instant messages, sniffers, and a thousand other topics. There are...

Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange
Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange

Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric...

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet

WHEN I FIRST MET BARRETT LYON in 2004, I was covering Internet security for the Los Angeles Times from an office in San Francisco. His story was so good—and met a journalistic need so deep—that I had a hard time believing it was true.

For more than a year, I had been grappling with an onslaught of urgent but...

Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)

With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200...

Digital Privacy and Security Using Windows: A Practical Guide
Digital Privacy and Security Using Windows: A Practical Guide

Use this hands-on guide to understand the ever growing and complex world of digital security. Learn how to protect yourself from digital crime, secure your communications, and become anonymous online using sophisticated yet practical tools and techniques.

This book teaches you how to secure your online identity and personal...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy