 |
|
 |  |  |  |  Fabrication of SiGe HBT BiCMOS Technology
While the idea of cleverly using silicon–germanium (SiGe) and silicon (Si) strained-layer epitaxy to
practice bandgap engineering of semiconductor devices in the highly manufacturable Si material system
is an old one, only in the past decade has this concept become a practical reality. The final success of
creating novel Si... |
|
 CSS3 Solutions: Essential Techniques for CSS3 Developers
CSS3 is the latest standard for CSS, the syntax to control the style and layout of web pages.
CSS3 is completely backward-compatible, so you will not have to change your existing designs. The CSS3
specification is still under development by the World Wide Web Consortium (W3C). However, many of the
new CSS3 properties... |  |  The Adobe Photoshop CS3 Book for Digital Photographers
Scott Kelby was honored with Professional Photographer magazine’s highly coveted 2008 Hot One Award for The Adobe Photoshop CS3 Book for Digital Photographers. Here’s what Jeff Kent, the Hot One Editor at Professional Photographer, has to say about the book: “In a how-to published by Peachpit Press, Scott Kelby,... |  |  Mechanical Behavior of Materials
Everything that surrounds us is matter. The origin of the word matter
is mater (Latin) or matri (Sanskrit), for mother. In this sense, human
beings anthropomorphized that which made them possible – that
which gave them nourishment. Every scientific discipline concerns
itself with matter. Of all matter surrounding us, a... |
|
|
 Microsoft Office 365: Connect and Collaborate Virtually Anywhere, Anytime
Train. Coffee shop. Soccer field. Now you can connect, collaborate, and get things done—virtually anywhere—using Microsoft Office 365. Guided by business productivity expert Katherine Murray, you’ll get a running start with Office 365 cloud-based business services. And you’ll take wing as you learn best... |  |  Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
The phone rings, and the networking guys tell you that you’ve been hacked and that your customers’ sensitive information is being stolen from your network. You begin your investigation by checking your logs to identify the hosts involved. You scan the hosts with antivirus software to find the malicious program, and catch a lucky ... |  |  FreeBSD Device Drivers: A Guide for the Intrepid
Welcome to FreeBSD Device Drivers! The goal of this book is to help you improve your understanding of device drivers under FreeBSD. By the time you finish this book, you should be able to build, configure, and manage your own FreeBSD device drivers.
This book covers FreeBSD version 8, the version recommended for production ... |
|
| Result Page: 63 62 61 60 59 58 57 56 55 54 53 |