DSP Applications Using C and the TMS320C6x DSK
Digital signal processors, such as the TMS320 family of processors, are used in a
wide range of applications, such as in communications, controls, speech processing,
and so on. They are used in fax transmission, modems, cellular phones, and other
devices. These devices have also found...
PCs: The Missing Manual
Your vacuum comes with one. Even your blender comes with one. But your PC--something that costs a whole lot more and is likely to be used daily and for tasks of far greater importance and complexity--doesn't come with a printed manual. Thankfully, that's not a problem any longer: PCs: The Missing...
Deploying Cisco Voice over IP Solutions If you've got a wide area network (WAN) already, putting interoffice voice traffic on it is an obvious application for it. Voice signals take up so little bandwidth, and the cost savings can be so significant, that Voice over IP (VoIP) deserves serious consideration. However, you can easily throw away years of cost savings by bringing in...
Windows XP For Dummies, 2nd Edition Covers the latest Windows XP updates including Service Pack 2
Fully revised to quickly answer your XP questions
You asked for more coverage of Outlook Express, scanning and faxing, CD burning, and more in Windows XP For Dummies — and we delivered! This updated edition is packed with answers to your Windows XP questions, from...
World Class IT: Why Businesses Succeed When IT Triumphs
Prior to the 1970s, computer and electronics-based technology
was hardly a pervasive part of our everyday lives. Automobiles
were not yet computerized, fax machines were just taking off, and,
significantly, the personal computer had yet to be popularized.
Individuals who dreamed of a career in information technology
How Electronic Things Work... And What to do When They Don't
Electronic equipment 'on the blink'? Don't junk it or pay sky-high repair costs - fix it yourself! Here's a guide to understanding and repairing electronics equipment written for people who would ordinarily 'call the shop'. With this fully illustrated, simple-to-use guide, you will get a grasp of the workings of the...
Mac OS X Panther Hacks: 100 Industrial Strength Tips & Tools Like the animal it's named for, Mac OS X Panther is beautiful, sleek, superbly efficient, dangerously alluring, and all muscle under the surface. Beneath its appealing interface, it's a hard-working machine. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh they're used... Privacy Protection and Computer Forensics, Second Edition This book deals with security from hostile computer forensics (mostly on
one’s computer, but also on one’s digital camera, fax machine, and related
computer-like electronics), as distinct from network forensics, which in this
context is snooping into users’ online activities. Computer forensics deals
|Result Page: 4 3 2 1 |