Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Embedded DSP Processor Design, Volume 2: Application Specific Instruction Set Processors (Systems on Silicon)
Embedded DSP Processor Design, Volume 2: Application Specific Instruction Set Processors (Systems on Silicon)
This book's "how-to" approach will help engineers design powerful, flexible products, while minimizing cost and power-consumption!

This book provides design methods for Digital Signal Processors and Application Specific Instruction set Processors, based on the author's extensive, industrial design experience.
...
High Performance Computing (RISC Architectures, Optimization & Benchmarks)
High Performance Computing (RISC Architectures, Optimization & Benchmarks)

The computing power that's available on the average desktop has exploded in the past few years. A typical PC has performance exceeding that of a multi-million dollar supercomputer a mere decade ago. To some people, that might mean that it's time to sit back and watch computers get faster: performance is no longer an issue,...

Introduction to Network Security (Networking Series)
Introduction to Network Security (Networking Series)
In today's online, connected world where computers outsell TVs and e-commerce sales surpass those of "brick-and-mortar" stores, secure network environments are a necessity. Weaknesses within networks have led to the rapid growth of identity theft and computer virus outbreaks, so the demand for skilled and aspiring system administrators...
Python Unlocked
Python Unlocked

Key Features

  • Write smarter, bug-free, high performance code with minimal effort
  • Uncover the best tools and options available to Python developers today
  • Deploy decorators, design patters, and various optimization techniques to use Python 3.5 effectively

Book...

The Complete Rust Programming Reference Guide: Design, develop, and deploy effective software systems using the advanced constructs of Rust
The Complete Rust Programming Reference Guide: Design, develop, and deploy effective software systems using the advanced constructs of Rust

Design and implement professional-level programs by leveraging modern data structures and algorithms in Rust

Key Features

  • Improve your productivity by writing more simple and easy code in Rust
  • Discover the functional and reactive implementations of traditional data...
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 9th International Conference
Mobile and Ubiquitous Systems: Computing, Networking, and Services: 9th International Conference

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Mobile and Ubiquitous Systems: Computing, Networking, and Services, MobiQuitous 2012, held in Beijing, China, Denmark, in December 2012. The revised full papers presented were carefully reviewed and selected from numerous...

The Analysis of Controlled Substances (Analytical Techniques in the Sciences)
The Analysis of Controlled Substances (Analytical Techniques in the Sciences)

This series of books provides coverage of all of the major analytical techniques and their application in the most important areas of physical, life and materials science. Each text is presented in an open learning/distance learning style, in which the learning objectives are clearly identified. The reader's understanding of the material is...

Oracle Database Performance and Scalability: A Quantitative Approach
Oracle Database Performance and Scalability: A Quantitative Approach

This book stemmed from the author’s other book—Software Performance and Scalability: a Quantitative Approach, published by Wiley in 2009. That book helps

readers grasp the basic concepts, principles, methodologies, best practices, queueing theories, and profiling tools associated with optimizing software performance and...

Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking
Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling...
Tech Mining: Exploiting New Technologies for Competitive Advantage
Tech Mining: Exploiting New Technologies for Competitive Advantage
In the “information economy,” we recognize the increasing availability of
information. On the one hand, we can be intimidated by the overwhelming
amount of information bearing down on us. On the other hand, we now have
tools to enable us to garner great value from that information quite readily.
New information
...
Gale Encyclopedia of Everyday Law
Gale Encyclopedia of Everyday Law
The Gale Encyclopedia of Everyday Law is a twovolume encyclopedia of practical information on laws and issues affecting people’s everyday lives. Readers will turn to this work for help in answering questions such as, “What is involved in estate planning?” “Do I have any recourse to noisy neighbors?” and “What are...
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL: Optimization, Backups, Replication, and More
High Performance MySQL is the definitive guide to building fast, reliable systems with MySQL. Written by noted experts with years of real-world experience building very large systems, this book covers every aspect of MySQL performance in detail, and focuses on robustness, security, and data integrity. High Performance MySQL teaches you advanced...
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy