Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Primer of Diagnostic Imaging: Expert Consult - Online and Print
Primer of Diagnostic Imaging: Expert Consult - Online and Print

Widely known as THE survival guide for radiology residents, fellows, and junior faculty, the "purple book" provides comprehensive, up-to-date coverage of diagnostic imaging in an easy-to-read, bulleted format. Focusing on the core information you need for learning and practice, this portable resource combines...

Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition
Mastering Rust: Learn about memory safety, type system, concurrency, and the new features of Rust 2018 edition, 2nd Edition

Become proficient in designing, developing and deploying effective software systems using the advanced constructs of Rust

Key Features

  • Improve your productivity using the latest version of Rust and write simpler and easier code
  • Understand Rust's immutability and...
HTML: A Beginner's Guide, Second Edition
HTML: A Beginner's Guide, Second Edition

Essential Skills--Made Easy!

Peel back the Web's opulent exterior and see how HTML makes it all look so great. Author Wendy Willard will help you understand HTML with clear lessons delivered in a proven learning system. In dedicated modules that act as stand-alone lessons, you'll discover how to structure a page, place images, size text,...

Blazor Revealed: Building Web Applications in .NET
Blazor Revealed: Building Web Applications in .NET
Build web applications in Microsoft .NET that run in any modern browser, helping you to transfer your .NET experience and skills to a new environment and build browser-based applications using a robust and type-safe language and runtime. Developing a web site with rich client-side behavior means most developers need to learn a...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Reinforcement Learning and Approximate Dynamic Programming for Feedback Control
Reinforcement Learning and Approximate Dynamic Programming for Feedback Control
Modern day society relies on the operation of complex systems including aircraft, automobiles, electric power systems, economic entities, business organizations, banking and finance systems, computer networks, manufacturing systems, and industrial processes, Decision and control are responsible for ensuring that these systems perform...
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras
Deep Learning Quick Reference: Useful hacks for training and optimizing deep neural networks with TensorFlow and Keras

Dive deeper into neural networks and get your models trained, optimized with this quick reference guide

Key Features

  • A quick reference to all important deep learning concepts and their implementations
  • Essential tips, tricks, and hacks to train a variety of deep learning...
Network Security Principles and Practices
Network Security Principles and Practices

Expert solutions for securing network infrastructures and VPNs.

  • Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments

  • Understand the inner...

The Best Damn Firewall Book Period
The Best Damn Firewall Book Period

This book is essential reading for anyone wanting to protect Internet-connected computers from unauthorized access. Coverage includes TCP/IP, setting up firewalls, testing and maintaining firewalls, and much more.

In the beginning, there were router access lists…

...
Redis Cookbook
Redis Cookbook

Redis is a data structure server with an in-memory dataset for speed. It is called a data structure server and not simply a key value store because Redis implements data structures allowing keys to contain binary safe strings, hashes, sets and sorted sets, as well as lists. This combination of flexibility and speed makes Redis the ideal tool...

RESTful Web API Design with Node.JS - Second Edition
RESTful Web API Design with Node.JS - Second Edition

Key Features

  • Create a fully featured RESTful API solution from scratch.
  • Learn how to leverage Node.JS, Express, MongoDB and NoSQL datastores to give an extra edge to your REST API design.
  • Use this practical guide to integrate MongoDB in your Node.js application.

Book...

Result Page: 46 45 44 43 42 41 40 39 38 37 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy