|
|
|
|
The Mechatronics Handbook (Electrical Engineering Handbook)The Mechatronics Handbook is highly recommended for academic libraries supporting undergraduate or advanced programs in electronics, electrical engineering, computer science, robotics, and related subjects. -Holly Flynn, Mathematics Librarian, Michigan State University Vernon G. Grove Research Library
…This handbook is a... | | Introduction to Random Signals and NoiseRandom signals and noise are present in many engineering systems and networks. Signal processing techniques allow engineers to distinguish between useful signals in audio, video or communication equipment, and interference, which disturbs the desired signal.
With a strong mathematical grounding, this text... | | Security in an IPv6 EnvironmentAs the number of intelligent systems that require direct access expands to the multiple billions, Internet Protocol Version 6 (IPv6) becomes an institutional imperative. However, questions are being raised about security aspects and subtending apparatuses of IPv6. This book provides a practical and accessible primer on this emerging technology. The... |
|
|
|
Advances in Mobile Radio Access NetworksThis book gives a comprehensive overview of the technologies for the advances of mobile radio access networks. The topics covered include linear transmitters, superconducting filters and cryogenic radio frequency (RF) front head, radio over fiber, software radio base stations, mobile terminal positioning, high speed downlink... | | Linux HPC Cluster InstallationFew people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more... | | Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... |
|
|
Result Page: 404 403 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 |