Home | Amazing | Today | Tags | Publishers | Years | Search 
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This Festschrift is dedicated to Mr. Sorin A. Huss by his friends and his Ph.D. students to honor him duly on the occasion of his 60th birthday.

Mr. Sorin A. Huss was born in Bukarest, Romania on May 21, 1950. He attended a secondary school with emphasis on mathematic and scientific topics in Dachau near Munich and after his Abitur...

The Linux Programming Interface: A Linux and UNIX System Programming Handbook
The Linux Programming Interface: A Linux and UNIX System Programming Handbook

The Linux Programming Interface is the definitive guide to the Linux and UNIX programming interface—the interface employed by nearly every application that runs on a Linux or UNIX system.

In this authoritative work, Linux programming expert Michael Kerrisk provides detailed descriptions of the system calls...

Microsoft® SQL Server® 2008 Analysis Services Step by Step
Microsoft® SQL Server® 2008 Analysis Services Step by Step

Teach yourself to use SQL Server 2008 Analysis Services for business intelligence?one step at a time. You'll start by building your understanding of the business intelligence platform enabled by SQL Server and the Microsoft Office System, highlighting the role of Analysis Services. Then, you’ll create a simple...

Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)
Oracle Enterprise Manager 10g Grid Control Handbook (Osborne ORACLE Press Series)

Let’s just look it right in the eye and call it out. We in the IT industries have been barraged with the buzzwords over and over again since we rolled into the new millennium: the transition to utility computing, or grid computing, or cloud computing (depending on the source/exact month/position of the stars in the sky). We’ve...

Practical PowerPivot & DAX Formulas for Excel 2010
Practical PowerPivot & DAX Formulas for Excel 2010

PowerPivot: What a name! Or I should really say what’s in a name? Powerful Pivoting? Pivot-table for power users?

PowerPivot is a lot more than that. When I started the PowerPivot project back in 2007, along with Amir Netz (Microsoft BI Distinguished Engineer), the incubation project was called BI Sandbox. We had been looking...

Sams Teach Yourself SharePoint Foundation 2010 in 24 Hours
Sams Teach Yourself SharePoint Foundation 2010 in 24 Hours

In just 24 sessions of one hour or less, you’ll learn how to create great websites, collaboration and content management applications, and social solutions with SharePoint Foundation 2010! Using this book’s straightforward, step-by-step approach, you’ll learn how to build, administer, and secure solutions...

Building the Perfect PC
Building the Perfect PC

Build a PC that will outperform any brand-name box on the market

Yes, even if you’re not a total geek you can build your own PC -- and we guarantee it’s worth the effort. You’ll discover that the quality is better and the cost is much lower than any comparable off-the-shelf PC you can buy. Design...

Ruby on Rails 3 Tutorial: Learn Rails by Example
Ruby on Rails 3 Tutorial: Learn Rails by Example

Ruby on Rails™ 3 Tutorial: Learn Rails by Example by Michael Hartl has become a must read for developers learning how to build Rails apps.”

—Peter Cooper, Editor of Ruby Inside

 

Using Rails 3, developers...

Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks
Controller-Based Wireless LAN Fundamentals: An end-to-end reference guide to design, deploy, manage, and secure 802.11 wireless networks

As wired networks are increasingly replaced with 802.11n wireless connections, enterprise users are shifting to centralized, next-generation architectures built around Wireless LAN Controllers (WLC). These networks will increasingly run business-critical voice, data, and video applications that once required wired...

Oracle WebCenter 11g Handbook: Build Rich, Customizable Enterprise 2.0 Applications
Oracle WebCenter 11g Handbook: Build Rich, Customizable Enterprise 2.0 Applications

Oracle WebCenter is the leading-edge product for developing nextgeneration enterprise portals and composite applications with Web 2.0 in mind. This book introduces you to the aspects of developing WebCenter applications and enriching those applications with social computing services, including discussions, documents, blogs, wikis, tags, and...

Developing Hybrid Applications for the iPhone: Using HTML, CSS, and JavaScript to Build Dynamic Apps for the iPhone
Developing Hybrid Applications for the iPhone: Using HTML, CSS, and JavaScript to Build Dynamic Apps for the iPhone

“For those not ready to tackle the complexities of Objective-C, this is a great way to get started building iPhone apps. If you know the basics of HTML, JavaScript, and CSS, you’ll be building apps in no time.”

—August Trometer, Owner of FoggyNoggin Software,...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Result Page: 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy