Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Creating Games in C++ : A Step-by-Step Guide
Creating Games in C++ : A Step-by-Step Guide
Do you love video games? Ever wondered if you could create one of your own, with all the bells and whistles? It's not as complicated as you'd think, and you don't need to be a math whiz or a programming genius to do it. In fact, everything you need to create your first game, "Invasion of the Slugwroths," is included in this book and...
Raspberry Pi: A Quick-Start Guide
Raspberry Pi: A Quick-Start Guide

Printed in full color.

Most of the book is targeted at beginners in computing and programming. A few parts, such as the small electronics project and setting up a web server, assume some intermediate skills.

The Raspberry Pi is one of the most successful open source hardware projects ever. For
...

Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The black hats have kept up with security enhancements. Have you?

In the technological arena, three years is a lifetime. Since the first edition of this book was published in 2004, built-in security measures on compilers and operating systems have become commonplace, but are still far from perfect. Arbitrary-code execution...

Telecommunications System Reliability Engineering, Theory, and Practice
Telecommunications System Reliability Engineering, Theory, and Practice

Practical tools for analyzing, calculating, and reporting availability, reliability, and maintainability metrics

Engineers in the telecommunications industry must be able to quantify system reliability and availability metrics for use in service level agreements, system design decisions, and daily operations. Increasing...

Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
Hands-On ZigBee: Implementing 802.15.4 with Microcontrollers (Embedded Technology)
"I recommend this book to anyone doing 802.15.4 or ZigBee development. It is likely that Eady touches on the platform you are or will be using and it contrasts it well with everything else out there." - William Wong, Electronic Design, August 2007

Since its recent introduction, the ZigBee protocol has created an
...
Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking
Getting Started with Bluetooth Low Energy: Tools and Techniques for Low-Power Networking

With Bluetooth Low Energy (BLE), smart devices are about to become even smarter. This practical guide demonstrates how this exciting wireless technology helps developers build mobile apps that share data with external hardware, and how hardware engineers can gain easy and reliable access to mobile operating systems.

This...

Building Embedded Systems: Programmable Hardware
Building Embedded Systems: Programmable Hardware
 This is a book about developing the software and hardware you never think about. We're talking about the nitty-gritty behind the buttons on your microwave, inside your thermostat, inside the keyboard used to type this description, and even running the monitor on which you are reading it now. Such stuff is termed embedded systems,...
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

 

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

Halvar Flake, CEO and head of research,...

Embedded Systems Firmware Demystified (With CD-ROM)
Embedded Systems Firmware Demystified (With CD-ROM)

Build embedded microprocessor-based systems from the ground up. Develop an integrated understanding of hardware and software issues by exploring the interaction of the firmware and hardware during the first critical few seconds after the microprocessor is powered up. By focusing on these crucial junctures, where software meets hardware, you...

Hardware/Firmware Interface Design: Best Practices for Improving Embedded Systems Development
Hardware/Firmware Interface Design: Best Practices for Improving Embedded Systems Development

Why care about hardware/firmware interaction? These interfaces are critical, a solid hardware design married with adaptive firmware can access all the capabilities of an application and overcome limitations caused by poor communication. For the first time, a book has come along that will help hardware engineers and firmware engineers work...

Validation of Telecom Systems with SDL
Validation of Telecom Systems with SDL
Validation of Communications Systems with SDL provides a clear practical guide to validating, by simulation, a telecom system modelled in SDL. SDL, the Specification and Description Language standardised by the International Telecommunication Union (ITU-T), is used to specify and develop complex systems such as GSM, GPRS, UMTS, IEEE 802.11...
unlimited object storage image
Result Page: 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy