Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
High Performance Embedded Computing Handbook: A Systems Perspective

Buy
Embedded systems technology involves a range of topics, including analog-to-digital conversion and application-specific integrated circuit design. From the history of high-performance computing to a discussion of future directions, High Performance Embedded Computing Handbook offers comprehensive coverage of all aspects of these computing systems, which have various applications in consumer electronics, radar, sonar, telecommunications, medical, and financial areas. Every component in a high-performance embedded system is defined and explained in detail, with leading academic and industry experts in the field providing a well-balanced treatment of theoretical and practical issues.
(HTML tags aren't allowed.)

Schaum's Outline of Principles of Computer Science
Schaum's Outline of Principles of Computer Science
Learn the essentials of computer science

Schaum’s Outline of Principles of Computer Science provides a concise overview of the theoretical foundation of computer science. It also includes focused review of object-oriented programming using Java.

About the Author

Paul...

SAP SCM: Applications and Modeling for Supply Chain Management (with BW Primer)
SAP SCM: Applications and Modeling for Supply Chain Management (with BW Primer)

SAP SCM: Applications and Modeling for Supply Chain Management empowers you to capitalize on the sophistication of SAP APO. This book provides clear advice on the inevitable, critical decisions that can lead to project success or failure and shows you, wherever you are on the supply chain management staff—buyer, planner, ground...

Developing Bioinformatics Computer Skills
Developing Bioinformatics Computer Skills
Bioinformatics--the application of computational and analytical methods to biological problems--is a rapidly evolving scientific discipline. Genome sequencing projects are producing vast amounts of biological data for many different organisms, and, increasingly, storing these data in public databases. Such biological databases are growing...

Metasploit Penetration Testing Cookbook, Second Edition
Metasploit Penetration Testing Cookbook, Second Edition

Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in...

Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter What is Cyber Crime? This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the
...
From Single to Scale: How a Single Person, Small Business, or an Entrepreneur Can Grow Their Business to Profit
From Single to Scale: How a Single Person, Small Business, or an Entrepreneur Can Grow Their Business to Profit
Scale your single-person business to profitability. Increase your audience, create multiple products, and generate more profit. This book takes you through the entire process of building a scalable business from the seemingly impossible place of "being just one person."

Most single-person businesses are
...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy