Home | Amazing | Today | Tags | Publishers | Years | Search 
Applied Numerical Methods Using MATLAB
Applied Numerical Methods Using MATLAB
This book introduces applied numerical methods for engineering and science students in sophomore to senior levels; it targets the students of today who do not like or do not have time to derive and prove mathematical results. It can also serve as a reference to MATLAB applications for professional engineers and scientists, since many of the MATLAB...
A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

Service-Oriented Architecture: SOA  Strategy, Methodology, and Technology
Service-Oriented Architecture: SOA Strategy, Methodology, and Technology
Aggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage. Service-Oriented Architecture (SOA): Strategy, Methodology, and Technology guides you through the challenges of deploying SOA. It demonstrates conclusively that...
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
Net Crimes & Misdemeanors: Outmaneuvering Web Spammers, Stalkers, and Con Artists
If you are reading this book or thinking about acquiring it, you have taken an important step toward increasing your awareness of the ways in which the Internet may be abused. J. A. Hitchcock has prepared a second edition of her popular book, Net Crimes and Misdemeanors, reflecting new ways in which you may encounter the dark side of global...
Berkshire Encyclopedia of Human-Computer Interaction (2 Volume Set)
Berkshire Encyclopedia of Human-Computer Interaction (2 Volume Set)
In hardly more than half a century, computers have become integral parts of everyday life, at home, work, and play. Today, computers affect almost every aspect of modern life, in areas as diverse as car design, filmmaking, disability services, and sex education.Human-computer interaction (HCI) is a vital new field that examines the ways in which...
How: Why How We Do Anything Means Everything...in Business (and in Life)
How: Why How We Do Anything Means Everything...in Business (and in Life)
The flood of information and unprecedented transparency reshaping today's business world has dramatically changed the rules of the game. It's no longer what you do that sets you apart from others, but how you do what you do. Whats are commodities, easily duplicated or reverse-engineered. Sustainable advantage and enduring success—for both...
Hardware Verification With SystemVerilog: An Object-oriented Framework
Hardware Verification With SystemVerilog: An Object-oriented Framework
This is the second of our books designed to help the professional verifier manage complexity. This time, we have responded to a growing interest not only in object-oriented programming but also in SystemVerilog. The writing of this second handbook has been just another step in an ongoing masochistic endeavor to make your professional lives as...
Implementing Service Quality in IP Networks
Implementing Service Quality in IP Networks

Why implement service quality? Is it possible to ensure reliable service quality in multi-service IP networks? Which technologies help in making end-to-end quality of service a realistic business proposition?

In Implementing Service Quality in IP Networks, Vilho Räisänen answers these questions and more. The author...

About Face 3: The Essentials of Interaction Design
About Face 3: The Essentials of Interaction Design
When the first edition of About Face was published in 1995, the idea of designing products based on human goals was a revolutionary concept. Thanks to the work of Alan Cooper and other pioneers, interaction design is now widely recognized as a unique and vital discipline, but our work is far from finished.

This completely updated volume...

Embedded Systems Architecture: A Comprehensive Guide for Engineers and Programmers (Embedded Technology)
Embedded Systems Architecture: A Comprehensive Guide for Engineers and Programmers (Embedded Technology)
This comprehensive textbook provides a broad and in-depth overview of embedded systems architecture for engineering students and embedded systems professionals. The book is well suited for undergraduate embedded systems courses in electronics/electrical engineering and engineering technology (EET) departments in universities and colleges, as well...
See MIPS Run, Second Edition
See MIPS Run, Second Edition
This second edition is not only a thorough update of the first edition, it is also a marriage of the best-known RISC architecture--MIPS--with the best-known open-source OS--Linux. The first part of the book begins with MIPS design principles and then describes the MIPS instruction set and programmers resources. It uses the MIPS32 standard as a...
Securing Converged IP Networks
Securing Converged IP Networks
This book offers advice on a range of critical subjects pertaining to security practices and procedures. Anyone moving toward a converged platform will find the approach beneficial and illuminating.
Phil Norton, Arthur J. Gallagher & Co.

This book delivers a requisite insight for security professionals to understand the scope and...

Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy