Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essential Issues in SOC Design: Designing Complex Systems-on-Chip
Essential Issues in SOC Design: Designing Complex Systems-on-Chip

This book originated from a workshop held at the DATE 2005 conference, namely Designing Complex SOCs. State-of-the-art in issues related to System-on-Chip (SoC) design by leading experts in the fields, covers IP development, verification, integration, chip implementation, testing and software.

SOC design is fast becoming the key...

Handbook of Software Engineering and Knowledge Engineering, Volume 1
Handbook of Software Engineering and Knowledge Engineering, Volume 1

This is the first handbook to cover comprehensively both software engineering and knowledge engineering - two important fields that have become interwoven in recent years. Over 60 international experts have contributed to the book. Each chapter has been written in such a way that a practitioner of software engineering and knowledge...

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!
Microsoft Visio 2010 Step by Step: The smart way to learn Microsoft Visio 2010-one step at a time!

Microsoft Visio 2010 is a bold new release. If you’re new to Visio, your timing is excellent! This version of Visio is easier to use than ever before and yet the diagrams you create can have more impact and style, and can present more real-world data than in any previous version.

If you’ve used prior versions...

VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)
VMware ESX and ESXi in the Enterprise: Planning Deployment of Virtualization Servers (2nd Edition)

Edward L. Haletky’s Complete, Solutions-Focused Guide to Running ESX Server 3.5, vSphere, and VMware 4.x

 

Extensively updated and revised, this is the definitive real-world guide to planning, deploying, and managing VMware ESX Server 3.5,...

Multiparadigm Constraint Programming Languages (Cognitive Technologies)
Multiparadigm Constraint Programming Languages (Cognitive Technologies)

"Modeling" has become one of the primary concerns in modern Software Engineering. The reason is simple: starting development processes from clear and succinct models has proven to foster not only quality but also productivity. With the advance of modeling there also came a desire for automatic code generation from models....

Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites
Photoshop Compositing Secrets: Unlocking the Key to Perfect Selections and Amazing Photoshop Effects for Totally Realistic Composites

 

Photoshop compositing has really blown up over the last few years. You see composites everywhere from magazine ads and covers, to movie posters, to athletic portraits, to, well, just about any kind of portrait. It really is everywhere. Clients and customers are very aware of Photoshop now and
...
IBM DB2 9.7 Advanced Application Developer Cookbook
IBM DB2 9.7 Advanced Application Developer Cookbook
Welcome to the DB2 9.7 Advanced Application Developer Cookbook. DB2 9.7 is a truly incredible database product from IBM, which offers an excellent mix of application performance, reliability, and ease of development enablement. In this cookbook, you can find both: hands-on and real world practical application development examples, as well...
Security 2020: Reduce Security Risks This Decade
Security 2020: Reduce Security Risks This Decade

Identify real security risks and skip the hype

After years of focusing on IT security, we find that hackers are as active and effective as ever. This book gives application developers, networking and security professionals, those that create standards, and CIOs a straightforward look at the reality of today’s IT...

The Machine Question: Critical Perspectives on AI, Robots, and Ethics
The Machine Question: Critical Perspectives on AI, Robots, and Ethics

One of the enduring concerns of moral philosophy is deciding who or what is deserving of ethical consideration. Much recent attention has been devoted to the "animal question" -- consideration of the moral status of nonhuman animals. In this book, David Gunkel takes up the "machine question": whether and to what extent...

Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores
Learning Cocoa with Objective-C: Developing for the Mac and iOS App Stores

Get up to speed on Cocoa and Objective-C, and start developing applications on the iOS and OS X platforms. If you don’t have experience with Apple’s developer tools, no problem! From object-oriented programming to storing app data in iCloud, the fourth edition of this book covers everything you need to build apps for the...

Collaborative Design and Learning: Competence Building for Innovation (International Series on Technology Policy and Innovation)
Collaborative Design and Learning: Competence Building for Innovation (International Series on Technology Policy and Innovation)

In today's knowledge-driven economy, the ability to share insight and know-how is essential for driving innovation and growth. In this groundbreaking volume, scholars from around the world demonstrate how communication and information technologies are enabling dynamic project design and management practices that challenge traditional...

Result Page: 927 926 925 924 923 922 921 920 919 918 917 916 915 914 913 912 911 910 909 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy