Home | Amazing | Today | Tags | Publishers | Years | Search 
C Programming for Microcontrollers Featuring ATMEL's AVR Butterfly and the free WinAVR Compiler
C Programming for Microcontrollers Featuring ATMEL's AVR Butterfly and the free WinAVR Compiler
Do you want a low cost way to learn C programming for microcontrollers? This book shows you how to use Atmel’s $19.99 AVR Butterfly board and the FREE WinAVR C compiler to make a very inexpensive system for using C to develop microcontroller projects.

Students will find the thorough coverage of C explained in the context of...

Proof, Language, and Interaction: Essays in Honour of Robin Milner (Foundations of Computing)
Proof, Language, and Interaction: Essays in Honour of Robin Milner (Foundations of Computing)
This volume is a Festschrift to honour the scientilfiifce and achievemento f Robin Milner. Robin’s contributions have been both profound and varied, ovneorw ,a o pfs eormioed , thirty years. They range througthhe semantic foundationso f programming languages, computerassisted theorem-proving, programming language design, andth e theory of...
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion
Every day, billions of photographs, news stories, songs, X-rays, TV shows, phone calls, and emails are being scattered around the world as sequences of zeroes and ones: bits. We can’t escape this explosion of digital information and few of us want to–the benefits are too seductive. The technology has enabled unprecedented innovation,...
Middleware for Network Eccentric and Mobile Applications
Middleware for Network Eccentric and Mobile Applications
Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development.

This textbook provides a...

Programming Microsoft SQL Server 2008 (PRO-Developer)
Programming Microsoft SQL Server 2008 (PRO-Developer)

Written by industry professionals who have been working with SQL Server 2008 since the earliest code, this reference expertly covers the programming fundamentals for SQL Server 2008 with crucial real-world context and extensive code samples.

Get the hands-on programming instruction, practical examples, and best practices you
...

Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Data Preparation for Data Mining addresses an issue unfortunately ignored by most authorities on data mining: data preparation. Thanks largely to its perceived difficulty, data preparation has traditionally taken a backseat to the more alluring question of how best to extract meaningful knowledge. But without adequate preparation of your...
Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Active Directory Cookbook, 3rd Edition
Active Directory Cookbook, 3rd Edition
When you need practical hands-on support for Active Directory, the updated edition of this extremely popular Cookbook provides quick solutions to more than 300 common (and uncommon) problems you might encounter when deploying, administering, and automating Microsoft's network directory service. For the third edition, Active Directory expert Laura...
Mule 2: A Developer's Guide (Firstpress)
Mule 2: A Developer's Guide (Firstpress)
Published with the developer in mind, firstPress technical briefs explore emerging technologies that have the potential to be critical for tomorrow's industry. Apress keeps developers one step ahead by presenting key information as early as possible in a PDF of 150 pages or less. Explore the future through Apress...

Mule 2: A...

Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
Disappearing Cryptography, Second Edition - Information Hiding: Steganography and Watermarking
"Disappearing Cryptography is a witty and entertaining look at the world of information hiding. Peter Wayner provides an intuitive perspective of the many techniques, applications, and research directions in the area of steganography. The sheer breadth of topics is outstanding and makes this book truly unique. A must read for...
Handbook on Architectures of Information Systems (International Handbooks on Information Systems)
Handbook on Architectures of Information Systems (International Handbooks on Information Systems)
This book is the first volume of a running series under the title International Handbooks on Information Systems. The series is edited by Peter Bernus, Jacek Blazewicz, Günter Schmidt and Mike Shaw. One objective is to give state of the art surveys on selected topics of information systems theory and applications. To this end, a distinguished...
How Computers Work: Processor and Main Memory
How Computers Work: Processor and Main Memory
The book is as simple as possible and aimed at a non-technical audience with absolutely no knowledge of computers or electronics, but it is an electrical engineering text. A typical page consists of a circuit diagram (or program) and a paragraph or two of explanation. The book begins with a VERY simple circuit and continues to a very complex...
Result Page: 344 343 342 341 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy