Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors
Microprocessor Architecture: From Simple Pipelines to Chip Multiprocessors

Computer architecture is at a turning point. Radical changes occurred in the 1980s when the Reduced Instruction Set Computer (RISC) philosophy, spurred in good part by academic research, permeated the industry as a reaction to the Complex Instruction Set Computer (CISC) complexities. Today, three decades later, we have reached a point where...

Understanding 8085/8086 Microprocessor and Peripheral ICs: (Through Question & Answer)
Understanding 8085/8086 Microprocessor and Peripheral ICs: (Through Question & Answer)

Since the advent of microprocessors in the 70s, a good many books have been written covering different aspects of microprocessors and microcomputers. A knowledge and exposure to microprocessors is a must for practising engineers and scientists in the fields of Electrical, Electronics, Instrumentation and Software Engineering.

This...

Cyberthreats: The Emerging Fault Lines of the Nation State
Cyberthreats: The Emerging Fault Lines of the Nation State

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an...

Real Leaders Don't Do PowerPoint: How to Sell Yourself and Your Ideas
Real Leaders Don't Do PowerPoint: How to Sell Yourself and Your Ideas

Think about the most powerful speech you’ve ever heard a leader give. What made that speech–and that speaker–memorable was likely a mix of authenticity, stage presence, masterful delivery, and–above all–an inspirational message.

Nobody ever walked out of a great speech saying, “I loved the
...

Apple Pro Training Series: Logic Pro 9 and Logic Express 9
Apple Pro Training Series: Logic Pro 9 and Logic Express 9

Completely revised and updated for Logic Pro 9 and Logic Express 9, this Apple-certified guide shows you how to record, produce, and polish music files with Apple’s professional audio software. Veteran music producer David Nahmani’s step-by-step, instructions teach you everything from basic music creation to advanced production...

Middleware for Network Eccentric and Mobile Applications
Middleware for Network Eccentric and Mobile Applications
Middleware is a critical foundation needed to leverage the development of a wide range of mobile and ubiquitous applications. Intrinsic challenges when building such middleware require the combination of expertise from areas like distributed systems, networking, software engineering, and application development.

This textbook provides a...

Darwin's Lost World: The Hidden History of Animal Life
Darwin's Lost World: The Hidden History of Animal Life
Some 150 years ago, in 1859, Charles Darwin was greatly puzzled by a seeming absence of animal fossils in rocks older than the Cambrian period. He drew attention to a veritable Lost World that was later found to have spanned more than eighty per cent of Earth history. This book tells the story of his lost world, and of the quest to rescue its...
Mercurial: The Definitive Guide
Mercurial: The Definitive Guide
Mercurial is the easiest system to learn when it comes to distributed revision control-ideal whether you're a lone programmer working on a small project, or part of huge team dealing with thousands of files. This definitive guide takes you step by step through ways to track, merge, and manage both open source and commercial software projects with...
Dependency Injection
Dependency Injection
Dependency Injection is an in-depth guide to the current best practices for using the Dependency Injection pattern-the key concept in Spring and the rapidly-growing Google Guice. It explores Dependency Injection, sometimes called Inversion of Control, in fine detail with numerous practical examples. Developers will learn to apply important...
Handbook of Optics, Third Edition Volume II: Design, Fabrication and Testing, Sources and Detectors, Radiometry and Photometry
Handbook of Optics, Third Edition Volume II: Design, Fabrication and Testing, Sources and Detectors, Radiometry and Photometry

The most comprehensive and up-to-date optics resource available

Prepared under the auspices of the Optical Society of America, the five carefully architected and cross-referenced volumes of the Handbook of Optics, Third Edition, contain everything a student, scientist, or engineer requires to actively work in...

The Physics of Rugby
The Physics of Rugby
This book began three decades ago, on a cold Saturday morning in early September. That was when I pulled on for the first time the scarlet jersey of Icknield, a high school named for a fierce tribe of Britons, the Iceni, who under their warrior queen Boadicea inflicted several heavy defeats upon the Romans. Our opponents that morning were from the...
Efficiency Instead of Justice?: Searching for the Philosophical Foundations of the Economic Analysis of Law (Law and Philosophy Library)
Efficiency Instead of Justice?: Searching for the Philosophical Foundations of the Economic Analysis of Law (Law and Philosophy Library)

Economic analysis of law is an interesting and challenging attempt to employ the concepts and reasoning methods of modern economic theory so as to gain a deeper understanding of legal problems. According to Richard A. Posner it is the role of the law to encourage market competition and, where the market fails because transaction costs are too...

unlimited object storage image
Result Page: Previous 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy