Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Designing Embedded Processors: A Low Power Perspective
Designing Embedded Processors: A Low Power Perspective
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.

Increasingly, these systems have to consume little energy....

An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
An Introduction to Mathematical Cryptography (Undergraduate Texts in Mathematics)
This self-contained introduction to modern cryptography emphasizes the mathematics behind the theory of public key cryptosystems and digital signature schemes. The book focuses on these key topics while developing the mathematical tools needed for the construction and security analysis of diverse cryptosystems. Only basic linear algebra is required...
JavaScript(TM) Phrasebook
JavaScript(TM) Phrasebook
Developers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few...
EndNote 1 - 2 - 3  Easy!: Reference Management for the Professional
EndNote 1 - 2 - 3 Easy!: Reference Management for the Professional
Reference management is the process of storing, managing, retrieving, and citing references from various sources. Learning effective reference management is critically important for healthcare and biomedical professionals as it is a major component of the process of scientific manuscript writing. Effective reference management is also useful for...
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
TCP/IP Sockets in C, Second Edition: Practical Guide for Programmers (The Morgan Kaufmann Practical Guides Series)
This succinct new edition of our best-selling title presents everything you need know to get up and running with C sockets programming in one affordable volume!

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to
...
Music Composition For Dummies
Music Composition For Dummies

Creative exercises build your composing skills

The fun and easy way to turn the tune in your head into a full-fledged composition!

Wish you could write music? You can! This friendly guide gives you everything you need to start composing, from choosing the right rhythm and tempo to...

Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Securing Java: Getting Down to Business with Mobile Code, 2nd Edition
Information Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent...
Grant Writing For Dummies
Grant Writing For Dummies

Learn to:

  • Navigate federal grant databases and apply online for grants
  • Find the most current public and private sector grant opportunities
  • Create strong statements of need
  • Submit applications that meet funders’ expectations

Your comprehensive...

Unobstructed Shortest Paths in Polyhedral Environments (Lecture Notes in Computer Science)
Unobstructed Shortest Paths in Polyhedral Environments (Lecture Notes in Computer Science)

The study of minimum paths on or around polyhedra in Euclidean 3-space is of growing importance in robotics. This work presents new algorithms based on extensions of the Voronoi diagram. Since experience with new algo- rithms is also important, this work also describes a workbench to allow experimentation.

This book is...

Credit and Community: Working-Class Debt in the UK since 1880
Credit and Community: Working-Class Debt in the UK since 1880
Credit's centrality to the current economic crisis makes the publication of Sean O'Connell's social history of working-class credit consumption particularly timely. Although the credit crunch came too late to be included in this book, the portrait of a complex relationship between lenders and borrowers over the past 120 years should be required...
The Jossey-Bass Academic Administrator's Guide to Budgets and Financial Management
The Jossey-Bass Academic Administrator's Guide to Budgets and Financial Management

Newly appointed academic managers are often unsure how to effectively manage their department's fiscal affairs. The Jossey-Bass Academic Administrator's Guide to Budgets and Financial Management is specifically designed for administrators who need guidance for managing the fiscal resources of a department or unit. Using this...

Post Quantum Cryptography
Post Quantum Cryptography
Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy