Home | Amazing | Today | Tags | Publishers | Years | Search 
Digital Design (VHDL): An Embedded Systems Approach Using VHDL
Digital Design (VHDL): An Embedded Systems Approach Using VHDL

This book provides a foundation in digital design for students in computer engineering, electrical engineering and computer science courses. It deals with digital design as an activity in a larger systems design context. Instead of focusing on gate-level design and aspects of digital design that have diminishing relevance in a...

Geometric Algebra: An Algebraic System for Computer Games and Animation
Geometric Algebra: An Algebraic System for Computer Games and Animation

In my first book on geometric algebra in 2007 the preface described how I had been completely surprised by the existence of geometric algebra, especially after having recently completed a book on vector analysis where it was not even mentioned! So why am I writing a second book on the same subject?Well it’s not because I have...

Adobe Dreamweaver CS4 on Demand
Adobe Dreamweaver CS4 on Demand

Adobe Dreamweaver CS4 on Demand

 

What you need, when you need it!

 

Need answers quickly? Adobe Dreamweaver CS4 on Demand provides those answers in a visual step-by-step format. We will...

Microsoft® SQL Server 2008 R2 Analytics & Data Visualization
Microsoft® SQL Server 2008 R2 Analytics & Data Visualization

This book is written for the “information worker” businessperson who already uses Microsoft Office applications such as Excel, Word, or Visio to accomplish his or her daily work. Today, information workers most often work in the collaboration environment of SharePoint, where their spreadsheets and documents are saved and...

Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research
Voice over IP Security: A Comprehensive Survey of Vulnerabilities and Academic Research

When I decided to do a sabbatical with Symantec Research Labs Europe in the beautiful French Riviera, I was asked to work on a project about Voice over IP (VoIP) security. The goal of the VAMPIRE Project1 was to understand the threats and vulnerabilities of VoIP systems, and to inform the direction of further research efforts....

Principles of Internet Marketing: New Tools and Methods for Web Developers (Web Technologies)
Principles of Internet Marketing: New Tools and Methods for Web Developers (Web Technologies)

Principles of Internet Marketing: New Tools and Methods for Web Developers will help you understand the “why” behind the “how” of Web site development. Th is book will help you see sites not from the developer’s perspective, but rather from the marketer’s point of view. It will teach you about the...

Advanced Topics in Information Retrieval (The Information Retrieval Series)
Advanced Topics in Information Retrieval (The Information Retrieval Series)

This book presents a wide-spectrum illustration of what research in Information Retrieval has produced or will produce in the next years. The book content includes chapters on Aggregated Search, Digital Advertising, Digital Libraries, Discovery of Spam and Opinions in the Web, Evaluation, Information Retrieval in Context, Multimedia...

The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)
The Decision Model: A Business Logic Framework Linking Business and Technology (IT Management)

In the current fast-paced and constantly changing business environment, it is more important than ever for organizations to be agile, monitor business performance, and meet with increasingly stringent compliance requirements. Written by pioneering consultants and bestselling authors with track records of international success, The...

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

I am not an expert. I have never claimed to be an expert at anything (at least not seriously done so), least of all an expert in forensic analysis. I am not an expert in Windows Registry analysis. I am simply, by profession, a responder and analyst with some work and research experience in this area. I have also performed a number...

Twitter For Dummies (Computer/Tech)
Twitter For Dummies (Computer/Tech)

Have you heard? All the world’s a-twitter!

Twitter is a tool that you can use to send and receive short, 140-character messages from your friends, from the organizations you care about, from the businesses you frequent, from the publications you read, or from complete strangers who share (or don’t share) your...

Wedding Videography Start to Finish
Wedding Videography Start to Finish

Welcome to Wedding Videography: Start to Finish, a resource to help you step confidently into the field of wedding videography. This book is designed to step the novice wedding videographer through the process of starting a wedding-videography business, filming a wedding, editing the wedding footage, and outputting the final product...

Handbook of FPGA Design Security
Handbook of FPGA Design Security

The purpose of this book is to provide a practical approach to managing security in FPGA designs for researchers and practitioners in the electronic design automation (EDA) and FPGA communities, including corporations, industrial and government research labs, and academics. This book combines theoretical underpinnings with a practical...

Result Page: 191 190 189 188 187 186 185 184 183 182 181 180 179 178 177 176 175 174 173 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy