Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Advanced Electrical Installation Work, Fourth Edition
Advanced Electrical Installation Work, Fourth Edition

Advanced Electrical Installation Work has helped thousands of students to achieve success in City & Guilds awards in electrical installation. Now in its fourth edition, this book has been completely restructured to provide a specific match to the requirements of the Installation route of the 2330 Level 3...

Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Getting Started with Electronic Projects
Getting Started with Electronic Projects

Build thrilling and intricate electronic projects using LM555, ZigBee, and BeagleBone

About This Book

  • Get acquainted with fundamental concepts such as tools and circuits required for the projects
  • Develop stunning cost-effective projects and build your own range of designs including...
Mail and Internet Surveys: The Tailored Design Method  2007 Update with New Internet, Visual, and Mixed-Mode Guide
Mail and Internet Surveys: The Tailored Design Method 2007 Update with New Internet, Visual, and Mixed-Mode Guide
A crucial resource for increasing response rates and obtaining high-quality feedback from mail, electronic, and other surveys

Don Dillman's Mail and Internet Surveys, Second Edition has been the definitive guide for creating and conducting successful surveys using both traditional and new media channels. Now, this...

GPRS Networks
GPRS Networks
GPRS is principally an overlay network for existing GSM networks which enables all the benefits of packet switched networks to be available to mobile devices. Due to the delay in 3G rollout, operators worldwide are increasingly implementing services based on GPRS, once seen by many as simply a stepping-stone between GSM and UMTS.  If you are...
Raspberry Pi Blueprints
Raspberry Pi Blueprints

Design and build your own hardware projects that interact with the real world using the Raspberry Pi

About This Book

  • Interact with a wide range of additional sensors and devices via Raspberry Pi
  • Create exciting, low-cost products ranging from radios to home security and weather...
Public Key Infrastructure and Implementation and Design
Public Key Infrastructure and Implementation and Design
Today we are in the midst of an electronic business revolution. The growth of the Internet and e−commerce has presented businesses with an opportunity to forge new links with customers and partners by transcending borders and removing geographical barriers. Electronic information exchange and networking poses a greater threat than ever before...
Raspberry Pi Cookbook for Python Programmers
Raspberry Pi Cookbook for Python Programmers

Over 50 easy-to-comprehend tailor-made recipes to get the most out of the Raspberry Pi and unleash its huge potential using Python

Overview

  • Install your first operating system, share files over the network, and run programs remotely
  • Unleash the hidden potential of the Raspberry Pi's...
Introduction to Cryptography
Introduction to Cryptography

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on...

Network Calculus: A Theory of Deterministic Queuing Systems for the Internet
Network Calculus: A Theory of Deterministic Queuing Systems for the Internet
Network Calculus is a set of recent developments that provide deep insights into flow problems encountered in the Internet and in intranets. The first part of the book is a self-contained, introductory course on network calculus. It presents the core of network calculus, and shows how it can be applied to the Internet to obtain results that have...
Secure Systems Development with UML
Secure Systems Development with UML
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness.

Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML...

unlimited object storage image
Result Page: 133 132 131 130 129 128 127 126 125 124 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy