Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of Logic Design (with Companion CD-ROM)
Fundamentals of Logic Design (with Companion CD-ROM)

After studying this text, you should be able to apply switching theory to the solution of logic design problems.This means that you will learn both the basic theory of switching circuits and how to apply it. After a brief introduction, you will study Boolean algebra, which is the basic mathematical tool needed to analyze and synthesize...

Real Options Analysis Course : Business Cases and Software Applications
Real Options Analysis Course : Business Cases and Software Applications
Praise for Real Options Analysis Course

"Dr. Mun’s latest book is a logical extension of the theory and application presented in Real Options Analysis. More specifically, the Real Options Analysis Course presents numerous real options examples and provides the reader with step-by-step problem-solving techniques. After having read the...

Netduino Home Automation Projects
Netduino Home Automation Projects

With this book you could have the home of tomorrow, literally tomorrow. Its totally practical approach is perfect for the hobbyist who wants to use Netduino to automate their home. Full of fun projects and clear instructions.

Overview

  • Automate your house using a Netduino and a bunch of common...
Two Minute SQL Server Stumpers
Two Minute SQL Server Stumpers

This compilation of 100 SQL Server 2005 and 2008 questions will help update the reader on the latest versions of SQL Server. The text can be used to prepare for certification exams or to handle technical questions in the workplace.

...
Confessions of an IT Manager
Confessions of an IT Manager

Phil Factor is a legend in his own runtime. Scurrilous, absurd, confessional and scathing by turns, Confessions of an IT Manager targets the idiocy, incompetence and overreach of the IT management industry from vantage point all the way up and down the greasy pole. Phil Factor (real name witheld to protest the guilty) has over 20 years...

Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
Quantum Computing without Magic: Devices (Scientific and Engineering Computation)
"Quantum Computing without Magic gives a refreshing and down to earth approach to quantum information as well as quantum devices which will have a fundamental impact on the technology of the 21st century."
Raymond Laflamme, Canada Research Chair in Quantum Information, and Director, Institute for
...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

The Red Gate Guide to SQL Server Team-based Development
The Red Gate Guide to SQL Server Team-based Development

Only small projects, relevant to very few people, are built by the sweat and toil of a lone developer. Larger projects, affecting whole organizations, will invariably require a team of people to design and develop the application and its storage layer, or database.

In some cases, this will mean some developers and one or two DBAs,...

Hdl Chip Design: A Practical Guide for Designing, Synthesizing & Simulating Asics & Fpgas Using Vhdl or Verilog
Hdl Chip Design: A Practical Guide for Designing, Synthesizing & Simulating Asics & Fpgas Using Vhdl or Verilog

Arthur C. Clarke once wrote that any sufficiently advanced civilization would possess seemingly magical powers to a lesser-advanced one. Technology, and in particular computer technology, has and always will present a Janus head...

Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
Always Use Protection: A Teen's Guide to Safe Computing
Always Use Protection: A Teen's Guide to Safe Computing
Dan Appleman's career is typical of someone who, unable to choose what he wants to do for a living, decides to do everything. From founding a software company (Desaware), to cofounding a publishing company (Apress), to programming, to writing books (this is his seventh), he's a Brm believer that the question 'What do...
Protecting SQL Server Data
Protecting SQL Server Data

For as long as there has been something to communicate between two persons there has been data. Today, vast volumes of it are gathered about almost every individual and business. It is the information that we provide when we sign up for an account at our favorite website, fill out a job application, or apply for a mortgage.

These...

unlimited object storage image
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy