Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Advanced Web Services
Advanced Web Services

Web services and Service-Oriented Computing (SOC) have become thriving areas of academic research, joint university/industry research projects, and novel IT products on the market. SOC is the computing paradigm that uses Web services as building blocks for the engineering of composite, distributed applications out of the reusable application...

Junos Cookbook
Junos Cookbook

The Juniper Networks routing platforms are becoming the go-to solution for core, edge, metro and remote office networks, and JUNOS software is behind it all. The operating system is so full of industrial-strength routing protocols and IP innovations that those treading into the world of JUNOS will need clarification,...

From ASICs to SOCs: A Practical Approach
From ASICs to SOCs: A Practical Approach

The term SOC (system-on-a-chip) has been used in the electronic industry over the last few years. However, there are still a lot of misconceptions associated with this term. A good number of practicing engineers don't really understand the differences between ASICs and SOCs. The fact that the same EDA tools are used for both...

Essential Electronic Design Automation (EDA)
Essential Electronic Design Automation (EDA)

Essential Electronic Design Automation (EDA) demystifies this highly technical industry for anyone with a "need-to-know" about EDA. A friendly, informal introduction to EDA business and technology, clear enough for laypeople yet detailed enough for technical readers. The book also...

Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
Reuse Methodology Manual for System-on-a-Chip Designs
Reuse Methodology Manual for System-on-a-Chip Designs
Reuse Methodology Manual for System-on-a-Chip Designs, Third Edition outlines a set of best practices for creating reusable designs for use in an SoC design methodology. These practices are based on the authors' experience in developing reusable designs, as well as the experience of design teams in many companies around the world....
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (Cooperative Information Systems)
Service-Oriented Computing (SOC) promises a world of cooperating services loosely connected, creating dynamic business processes and agile applications that span organizations and platforms. As a computing paradigm, it utilizes services as fundamental elements to support rapid, low-cost development of distributed applications in heterogeneous...
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers
Advanced Infrastructure Penetration Testing: Defend your systems from methodized and proficient attackers

A highly detailed guide to performing powerful attack vectors in many hands-on scenarios and defending significant security flaws in your company's infrastructure

Key Features

  • Advanced exploitation techniques to breach modern operating systems and complex network devices
  • ...
Embedded Systems: Hardware, Design and Implementation
Embedded Systems: Hardware, Design and Implementation

Covers the significant embedded computing technologies—highlighting their applications in wireless communication and computing power

An embedded system is a computer system designed for specific control functions within a larger system—often with real-time computing constraints. It is embedded as part of a...

Techniques and Mechanisms in Electrochemistry
Techniques and Mechanisms in Electrochemistry
This book reveals electrochemistry as an integral part of modern physical chemistry, in particular as a branch of surface chemistry. It is written without excessive mathematical complexity, and with an emphasis on the mechanisms of electrochemical reactions and how they may be explored using modern techniques. Written primarily for mid to...
unlimited object storage image
Result Page: 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy