Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OpenCL Parallel Programming Development Cookbook
OpenCL Parallel Programming Development Cookbook

OpenCL (Open Computing Language) is the first royalty-free standard for cross platform, parallel programming of modern processors found in personal computers, servers, mobiles, and embedded devices. OpenCL greatly improves speed and responsiveness for a wide spectrum of applications in numerous market categories, from gaming and entertainment...

Hardware and Computer Organization (Embedded Technology)
Hardware and Computer Organization (Embedded Technology)
Today, we often take for granted the impressive array of computing machinery that surrounds us
and helps us manage our daily lives. Because you are studying computer architecture and digital
hardware, you no doubt have a good understanding of these machines, and you’ve probably written
countless programs on your PCs and
...
Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing
Computer Aided and Integrated Manufacturing Systems, Volume 4: Computer Aided Design / Computer Aided Manufacturing

This 5 volume MRW (Major Reference Work) is entitled "Computer Aided and Integrated Manufacturing Systems". A brief summary description of each of the 5 volumes will be noted in their respective PREFACES. An MRW is normally on a broad subject of major importance on the international scene. Because of the breadth of a major...

Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs (W/DVD)
Upgrading and Repairing PCs is the de facto standard PC hardware tome used by more PC professionals and hobbyists than any other book of its kind - selling more than 2.1 million copies in it's 13-edition history. In the 13th Edition, Scott has pulled out all of the stops, adding hundreds of page of new material, two hours of all new video and more...
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems
Modern Embedded Computing: Designing Connected, Pervasive, Media-Rich Systems

Modern embedded systems are used for connected, media-rich, and highly integrated handheld devices such as mobile phones, digital cameras, and MP3 players. All of these embedded systems require networking, graphic user interfaces, and integration with PCs, as opposed to traditional embedded processors that can perform only limited functions...

Micromessaging: Why Great Leadership is Beyond Words
Micromessaging: Why Great Leadership is Beyond Words

Should you sweat the small stuff?

Absolutely, says Stephen Young-especially when it comes to those critical behaviors that can make or break performance. The reason is simple: no matter what you think you're saying, your words, gestures, and tone of voice can actually communicate something entirely different.

...

C++ Standard Library Practical Tips (Programming Series)
C++ Standard Library Practical Tips (Programming Series)
Put the Power of the C++ Standard Library to Work!

C++ Standard Library Practical Tips teaches beginning and experienced programmers how to use the Standard Library and its major component the Standard Template Library (STL) effectively in routine programming chores. The book provides 100 quick, easy-to-use tips and solutions to common...

Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualizing Project Management: Models and Frameworks for Mastering Complex Systems
Visualization: A powerful technique for achieving high performance

Complex systems do not require complex project management. The most effective project managers are able to simplify their project environment and organize projects, large and small, to achieve predictable results. This book explains how anyone responsible for a project can apply...

Security and Privacy in Mobile Information and Communication Systems
Security and Privacy in Mobile Information and Communication Systems

MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...

Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

iOS 6 Programming Cookbook
iOS 6 Programming Cookbook
The long-awaited iOS 6 SDK (Software Development Kit) is finally out, and we need to learn about all the great features that this release offers us. Apple did a great job adding new features to the SDK and, of course, to iOS itself. iOS 6 is much more stable than the previous versions of iOS, as you would expect....
HackNotes(tm) Linux and Unix Security Portable Reference
HackNotes(tm) Linux and Unix Security Portable Reference

HackNotes Linux and Unix Security Portable Reference gives you step-by-step details of intrusion tactics, tools, and actual techniques currently being used by criminals to break into computer networks. This book will teach you how to protect and harden Linux and Unix hosts against the most troublesome security issues. Use the unique and...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy