Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Guide to RISC Processors: for Programmers and Engineers
Guide to RISC Processors: for Programmers and Engineers
Popular processor designs can be broadly divided into two categories: Complex Instruction
Set Computers (CISC) and Reduced Instruction Set Computers (RISC). The dominant
processor in the PC market, Pentium, belongs to the CISC category. However, the recent
trend is to use the RISC designs. Even Intel has moved from CISC to RISC
...
Computational Fluid Dynamics: Principles and Applications
Computational Fluid Dynamics: Principles and Applications
The history of Computational Fluid Dynamics, or CFD for short,, started in the early 1970’s. Around that time, it became an acronym for a combination of physics, numerical mathematics, and, to some extent, computer sciences employed to simulate fluid flows. The beginning of CFD was triggered by the availability of...
Computational Fourier Optics: A MATLAB Tutorial (SPIE Tutorial Texts Vol. TT89)
Computational Fourier Optics: A MATLAB Tutorial (SPIE Tutorial Texts Vol. TT89)
Computational Fourier Optics is a text that shows the reader in a tutorial form how to implement Fourier optical theory and analytic methods on the computer. A primary objective is to give students of Fourier optics the capability of programming their own basic wave optic beam propagations and imaging simulations. The book will also...
Project Management and Engineering Research: AEIPRO 2017 (Lecture Notes in Management and Industrial Engineering)
Project Management and Engineering Research: AEIPRO 2017 (Lecture Notes in Management and Industrial Engineering)
This is the Proceedings of the 20th International Congress on Project Management and Engineering, that was held at the Technical University of Cartagena, Spain, from July 13 to 15, 2016. It brings together a collection of recent works of researchers and professionals in the Project Management and Engineering fields of Civil Engineering and...
Cryptographic Security Architecture: Design and Verification
Cryptographic Security Architecture: Design and Verification
This book describes various aspects of cryptographic security architecture design, with a
particular emphasis on the use of rigorous security models and practices in the design. The
first portion of the book presents the overall architectural basis for the design, providing a
general overview of features such as the object model and
...
Microsoft Office XP Inside Out
Microsoft Office XP Inside Out

This book is written for the power user, the software enthusiast, the consultant, the solutions developer, or the company guru—the one others come to for help. It's designed for the person who wants to learn the essentials quickly and then go on to more interesting topics—advanced timesaving techniques, bug workarounds,...

Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence)
Mobile Robots: The Evolutionary Approach (Studies in Computational Intelligence)
The design and control of autonomous intelligent mobile robotic systems operating in unstructured changing environments includes many objective difficulties. There are several studies about the ways in which, robots exhibiting some degree of autonomy, adapt themselves to fit in their environments. The application and use of bio-inspired and...
CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD)
CCENT Cisco Certified Entry Networking Technician Study Guide (Exam 640-822) (Study Guide Book & CD)
Expert exam prep from leading Cisco authority Todd Lammle

Start your preparation here for Cisco's new CCENT entry-level networking certification, your entry point into Cisco's popular CCNA certification track. This comprehensive study guide from leading Cisco authority Todd Lammle thoroughly prepares you for the...

iPhone SDK Application Development: Building Applications for the AppStore
iPhone SDK Application Development: Building Applications for the AppStore
This practical book offers the knowledge and code you need to create cutting-edge mobile applications and games for the iPhone and iPod Touch, using Apple's iPhone SDK. iPhone SDK Application Development introduces you to this development paradigm and the Objective-C language it uses with numerous examples, and also walks you through the many SDK...
Programming the iPhone User Experience
Programming the iPhone User Experience
Apple's iPhone and iPod Touch not only feature the world's most powerful mobile operating system, they also usher in a new standard of human-computer interaction through gestural interfaces and multi-touch navigation. This book provides you with a hands-on, example-driven tour of UIKit, Apple's user interface toolkit, and includes common design...
Discrete Mathematics for Computer Scientists
Discrete Mathematics for Computer Scientists

Many colleges and universities offer a course in discrete mathematics. Students taking these courses are from many disciplines, one of the largest being computer science. As a part of the Mathematics Across the Curriculum project at Dartmouth, supported by the National Science Foundation,1 we proposed to create a discrete mathematics...

Appcelerator Titanium: Up and Running
Appcelerator Titanium: Up and Running

Build native apps for iOS, Android, and Blackberry from a single JavaScript codebase with Appcelerator Titanium. This guide gets you quickly up to speed on this amazing framework and shows you how to generate cross-platform apps with 100% native controls. You’ll also learn the advantages of using Titanium when you want to...

unlimited object storage image
Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy