Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programmable Controllers, Third Edition: An Engineer's Guide
Programmable Controllers, Third Edition: An Engineer's Guide

Andrew Parr's Programmable Controllers provides a thoroughly practical introduction to the use of PLCs in industry, covering programming techniques alongside systems-level design issues. In the third edition a masterclass series of real-world case studies have been added to illustrate typical engineering challenges - and model...

Advanced SQL: 1999 - Understanding Object-Relational and Other Advanced Features
Advanced SQL: 1999 - Understanding Object-Relational and Other Advanced Features
Advanced SQL:1999 - Understanding Object-Relational and Other Advanced Features is the practitioner's handbook to the standard's advanced features. It is not a re-presentation of the standard, but rather an authoritative, in-depth guide to its practical application. Like its companion, SQL:1999 - Understanding Relational Language...
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
Practical Modern SCADA Protocols: DNP3, 60870.5 and Related Systems (IDC Technology)
This is a comprehensive book covering the essentials of SCADA communication systems focusing on
DNP3 and the other new developments in this area. It commences with a brief review of the
fundamentals of SCADA systems hardware, software and the typical communications systems (such
as RS-232, RS-485, Ethernet and TCP/IP) that connect
...
Silicone Composite Insulators: Materials, Design, Applications (Power Systems)
Silicone Composite Insulators: Materials, Design, Applications (Power Systems)

Composite insulators have been in service in electric power networks successfully for more than 40 years, and now up to the highest operating voltages. The present book extensively covers such insulators with a special focus on today’s prevalent material, which is silicone rubber. It includes a detailed description of the electrical and...

IPTV Security: Protecting High-Value Digital Contents
IPTV Security: Protecting High-Value Digital Contents

Television was one of the inventions that shaped the way society and culture evolved over the second half of the twentieth century. It had the powerful effect of shrinking the world which creating a unified view of how things were. There continues to be an evolution of television and a migration towards a fully interactive and ubiquitous IPTV....

Standard Codecs: Image Compression to Advanced Video Coding (Telecommunications)
Standard Codecs: Image Compression to Advanced Video Coding (Telecommunications)
A substantially updated edition of "Video Coding: An Introduction to Standard Codecs", (IEE/1999) this book discusses the growth of digital television technology and the revolution in image and video compression (such as JPEG2000, broadcast TV, video phone), highlighting the need for standardization in processing static and moving images...
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
SQL Queries for Mere Mortals(R): A Hands-On Guide to Data Manipulation in SQL (2nd Edition)
Unless you are working at a very advanced level, this is the only SQL book you will ever need. The authors have taken the mystery out of complex queries and explained principles and techniques with such clarity that a "Mere Mortal" will indeed be empowered to perform the superhuman. Do not walk past this book!
Introduction to Multimedia Communications: Applications, Middleware, Networking
Introduction to Multimedia Communications: Applications, Middleware, Networking
Learn how to develop, design, and manage multimedia communication systems

Introduction to Multimedia Communications: Applications, Middleware, Networking introduces the state-of-the-art technology and skills needed to design integrated multimedia systems, combining text, graphics, audio, and video. The authors draw from the latest developments...

The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web
The Manager's Guide to Web Application Security: A Concise Guide to the Weaker Side of the Web

The Manager's Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written in plain language, with guidance on how to deal with those issues quickly and effectively. Often, security vulnerabilities are difficult to understand and quantify because they are...

Functional Safety, Second Edition: A Straightforward Guide to Applying IEC 61508 and Related Standards
Functional Safety, Second Edition: A Straightforward Guide to Applying IEC 61508 and Related Standards
Functional safety involves identifying specific hazardous failures which lead to serious consequences (e.g. death) and then establishing maximum tolerable frequency targets for each mode of failure. Equipment whose failure contributes to each of these hazards is identified and usually referred to as ‘safetyrelated’. Examples are...
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication

This is the third revised edition of the established and trusted RFID Handbook; the most comprehensive introduction to radio frequency identification (RFID) available.

This essential new edition contains information on electronic product code (EPC) and the EPC global network, and explains near-field communication (NFC) in...

Ada 2012 Rationale: The Language -- The Standard Libraries
Ada 2012 Rationale: The Language -- The Standard Libraries

Ada 2012 is the latest version of the international standard for the programming language Ada. It is designated ISO/IEC 8652:2012 (E) and is a new edition replacing the 2005 version. The primary goals for the new version were to further enhance its capabilities particularly in those areas where its reliability and predictability are of great...

unlimited object storage image
Result Page: 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy