Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Formal Verification of Floating-Point Hardware Design
Formal Verification of Floating-Point Hardware Design

This is the first book to focus on the problem of ensuring the correctness of floating-point hardware designs through mathematical methods.  Formal Verification of Floating-Point Hardware Design advances a verification methodology based on a unified theory of register-transfer logic and floating-point arithmetic that has...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps
Ethereum Projects for Beginners: Build blockchain-based cryptocurrencies, smart contracts, and DApps

Understand the Ethereum platform to build distributed applications that are secured and decentralized using blockchain technology

Key Features

  • Build your own decentralized applications using real-world blockchain examples
  • Implement Ethereum for building smart contracts and...
Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python, 2nd Edition
Learning Robotics using Python: Design, simulate, program, and prototype an autonomous mobile robot using ROS, OpenCV, PCL, and Python, 2nd Edition

Design, simulate, and program interactive robots

Key Features

  • Design, simulate, build, and program an interactive autonomous mobile robot
  • Leverage the power of ROS, Gazebo, and Python to enhance your robotic skills
  • A hands-on guide to creating an...
Propeller Programming: Using Assembler, Spin, and C
Propeller Programming: Using Assembler, Spin, and C
Learn to program the Propeller in Spin and C and how to map the Propeller Assembler (PASM) language from other high-level languages you might know.

The overall task you will pursue in the book is to implement a Delta Compression algorithm: first in Spin, then in PASM, then in C. Along the way, you'll review
...
A Tutorial Introduction to VHDL Programming
A Tutorial Introduction to VHDL Programming

This book helps readers create good VHDL descriptions and simulate VHDL designs. It teaches VHDL using selected sample problems, which are solved step by step and with precise explanations, so that readers get a clear idea of what a good VHDL code should look like.

The book is divided into eight chapters, covering aspects
...
Composing Software: An Exploration of Functional Programming and Object Composition in JavaScript
Composing Software: An Exploration of Functional Programming and Object Composition in JavaScript
All software design is composition: the act of breaking complex problems down into smaller problems and composing those solutions. Most developers have a limited understanding of compositional techniques. It's time for that to change.In "Composing Software", Eric Elliott shares the fundamentals of composition, including both...
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python
Mastering Machine Learning for Penetration Testing: Develop an extensive skill set to break self-learning systems using Python

Become a master at penetration testing using machine learning with Python

Key Features

  • Identify ambiguities and breach intelligent security systems
  • Perform unique cyber attacks to breach robust systems
  • Learn to leverage machine learning algorithms
  • ...
Basic Urological Management
Basic Urological Management
Welcome to Basic Urological Management. We hope you enjoy and learn from this book. The aim of this book is to not only gain knowledge but an understanding of patient pathways and what to do next for patients at different steps in each pathway. It is perfectly fine not to know something in medicine and then to go and...
Essays on Housing and Pensions: A European Perspective (Essays in Real Estate Research)
Essays on Housing and Pensions: A European Perspective (Essays in Real Estate Research)
Demographic trends put a burden on EU pension provision. As the sustainability of pension systems is addressed by current pension reforms, lower benefit levels are projected. In this scenario, households may want to consider supplementing their public pension income. As their own residence is on average their most valuable asset, its...
Epigenetics and Assisted Reproduction: An Introductory Guide
Epigenetics and Assisted Reproduction: An Introductory Guide

Epigenetics is the study of how certain genes are activated without modification at the DNA sequence level, resulting in genetically similar individuals having different clinical outcomes. As contemporary medicine increasingly aims to personalize the medical approach to a patient's genetic profile, the factors that can affect...

unlimited object storage image
Result Page: Previous 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy