Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Transaction-Level Modeling with Systemc: Tlm Concepts and Applications for Embedded Systems
Transaction-Level Modeling with Systemc: Tlm Concepts and Applications for Embedded Systems
Throughout the evolution of microelectronics industry, SoC designers
have always been struggling to improve their productivity in order to fully
exploit the growing number of transistors on a chip achievable by the silicon
process capacity.

The answer to this challenge has always been increasing the level of...
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits: An Introduction to Kernel Hacking
Designing BSD Rootkits introduces the fundamentals of programming and developing rootkits under the FreeBSD operating system. In addition to explaining rootkits and rootkit writing, the book aims to inspire readers to explore the FreeBSD kernel and gain a better understanding of the kernel and the FreeBSD operating system itself. Unlike...
Replication Techniques in Distributed Systems (Advances in Database Systems)
Replication Techniques in Distributed Systems (Advances in Database Systems)
The dream behind interconnecting large numbers of computers has been to have their combined capabilities serve users as one. This distributed computer would compose its resources so as to offer functionality, dependability, and performance, that far exceed those offered by a single isolated computer. This dream has started to be realized, insofar...
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)
Secure Data Management: VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings (Lecture Notes in Computer Science)

Concepts like ubiquitous computing and ambient intelligence that exploit increasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will be accessible anytime anywhere. This also has its downside in that it becomes easier to get unauthorized data...

Metasploit: The Penetration Tester's Guide
Metasploit: The Penetration Tester's Guide
"The best guide to the Metasploit Framework." —HD Moore, Founder of the Metasploit Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for...

Professional Mobile Application Development
Professional Mobile Application Development

IN RECENT YEARS, MOBILE DEVICES have gained popularity due to lower costs, small and sleek sizes, and the capability to act as a computer with you at all times. The increased use of mobile devices has created new issues for developers and network administrators, such as how to secure the devices, how to deal with increases in bandwidth, and...

The Exploit: A Theory of Networks (Electronic Mediations)
The Exploit: A Theory of Networks (Electronic Mediations)
It is our intention in this book to avoid the limits of academic writing in favor of a more experimental, speculative approach. To that end, we adopt a two - tier format. Throughout Part I, “Nodes,” you will find a number of condensed, italicized headers that are glued together with more standard prose. For quick immersion, we suggest...
Soft Computing and Intelligent Systems: Theory and Applications (Academic Press Series in Engineering)
Soft Computing and Intelligent Systems: Theory and Applications (Academic Press Series in Engineering)
The field of soft computing is emerging from the cutting edge research over the last ten years devoted to fuzzy engineering and genetic algorithms. The subject is being called soft computing and computational intelligence. With acceptance of the research fundamentals in these important areas, the field is expanding into direct applications through...
Microsoft SQL Server 2012 Internals (Developer Reference)
Microsoft SQL Server 2012 Internals (Developer Reference)

Dive deep inside the architecture of SQL Server 2012

Explore the core engine of Microsoft SQL Server 2012—and put that practical knowledge to work. Led by a team of SQL Server experts, you’ll learn the skills you need to exploit key architectural features. Go behind the scenes to understand internal operations...

Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition
Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition

Extend your programming expertise across the widest range of mobile devices with this incisive guide to Microsoft ASP.NET mobile controls. Now integrated into Microsoft Visual Studio .NET 2003, ASP.NET mobile controls enable you to build applications that render intelligently on different devices—regardless of markup language, browser, or...

Expert Oracle JDBC Programming
Expert Oracle JDBC Programming

With Oracle in the process of de-supporting SQLJ, JDBC is now really the only recommended means of interfacing between Java and Oracle. Consequently, this book is a must have for any developer building an Oracle Java application.

Many Java developers tend to treat Oracle as a "black box"; as a consequence, developers tend...

Variation-Aware Adaptive Voltage Scaling for Digital CMOS Circuits (Springer Series in Advanced Microelectronics)
Variation-Aware Adaptive Voltage Scaling for Digital CMOS Circuits (Springer Series in Advanced Microelectronics)

Increasing performance demands in integrated circuits, together with limited energy budgets, force IC designers to find new ways of saving power. One innovative way is the presented adaptive voltage scaling scheme, which tunes the supply voltage according to the present process, voltage and temperature variations as well as aging. The voltage...

unlimited object storage image
Result Page: 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy