Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post-Silicon Validation and Debug
Post-Silicon Validation and Debug

This book provides a comprehensive coverage of System-on-Chip (SoC) post-silicon validation and debug challenges and state-of-the-art solutions with contributions from SoC designers, academic researchers as well as SoC verification experts.  The readers will get a clear understanding of the existing debug infrastructure and how...

Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems
Hands-On Penetration Testing with Python: Enhance your ethical hacking skills to build automated and intelligent systems

Implement defensive techniques in your ecosystem successfully with Python

Key Features

  • Identify and expose vulnerabilities in your infrastructure with Python
  • Learn custom exploit development
  • Make robust and powerful cybersecurity tools with Python
  • ...
Applications of Fourier Transforms to Generalized Functions
Applications of Fourier Transforms to Generalized Functions
The generalized function is one of the important branches of mathematics that has enormous application in practical fields. Especially, its applications to the theory of distribution and signal processing are very much noteworthy. The method of generating solutions is the Fourier transform, which has great applications to the...
Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
Reuse Methodology Manual for System-on-a-Chip Designs
Reuse Methodology Manual for System-on-a-Chip Designs
Reuse Methodology Manual for System-on-a-Chip Designs, Third Edition outlines a set of best practices for creating reusable designs for use in an SoC design methodology. These practices are based on the authors' experience in developing reusable designs, as well as the experience of design teams in many companies around the world....
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous...
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Embedded Systems: Hardware, Design and Implementation
Embedded Systems: Hardware, Design and Implementation

Covers the significant embedded computing technologies—highlighting their applications in wireless communication and computing power

An embedded system is a computer system designed for specific control functions within a larger system—often with real-time computing constraints. It is embedded as part of a...

Techniques and Mechanisms in Electrochemistry
Techniques and Mechanisms in Electrochemistry
This book reveals electrochemistry as an integral part of modern physical chemistry, in particular as a branch of surface chemistry. It is written without excessive mathematical complexity, and with an emphasis on the mechanisms of electrochemical reactions and how they may be explored using modern techniques. Written primarily for mid to...
System-on-a-Chip: Design and Test
System-on-a-Chip: Design and Test
This project started as an interim report. The purpose was to communicate
to various groups within Advantest about the main issues for system-on-achip
(SoC) design and testing and the common industrial practices. Over
one year’s time, a number of people contributed in various capacities to complete
this report.
...
Result Page: 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy