Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...
Embedded Systems: Hardware, Design and Implementation
Covers the significant embedded computing technologies—highlighting their applications in wireless communication and computing power
An embedded system is a computer system designed for specific control functions within a larger system—often with real-time computing constraints. It is embedded as part of a...
Modern VLSI Design: System-on-Chip Design (3rd Edition)
For Electrical Engineering and Computer Engineering courses that cover the design and technology of very large scale integrated (VLSI) circuits and systems. May also be used as a VLSI reference for professional VLSI design engineers, VLSI design managers, and VLSI CAD engineers.Modern VSLI Design provides a comprehensive "bottom-up"...
Applications of Fourier Transforms to Generalized Functions
The generalized function is one of the important branches of mathematics
that has enormous application in practical fields. Especially, its applications
to the theory of distribution and signal processing are very much noteworthy.
The method of generating solutions is the Fourier transform, which has
great applications to the... Essential Issues in SOC Design: Designing Complex Systems-on-Chip
This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.
SOC design is fast becoming the key...
Exploring SE for Android
Discover Security Enhancements (SE) for Android to build your own protected Android-based systems
About This Book
Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
Build and enable current security enhancements from the SE for Android project...
|Result Page: 5 4 3 2 1 |