دانلود کتاب

خرید کتاب زبان اصلی رشته مهندسی کامپیوتر

خرید کتاب لاتین رشته مهندسی کامپیوتر Computer Engineering

سایت دانلود کتاب ایبوک گیگاپیپر یک از بزرگ‌ترین سایت‌های خرید کتاب از امازون ، گوگل بوکز و همچنین دانلود ایبوک از انتشارات گوناگون است.(خرید کتاب از انتشارات اشپرینگر , دانلود ایبوک انتشارات اسپرینگر , فروش کتابهای انتشارات مک گراهیل, دریافت کتب انتشارات مک گروهیل , خرید PDF کتابهای وایلی , فروش ایبوکهای انتشارات جان وایلی , دانلود کتاب های جان وایلی  و در یک کلام فروش کتاب های لاتین خارجی , کتابهای تخصصی و مقالات علمی است)
در کتابخانه مجازی گیگاپیپر بیش از 6 ملیون کتاب الکترونیکی از کلیه ناشرین موجود است. ایبوکها اکثرا به فرمت PDF , EPUB , AZW است که همگی به زبان اصلی است.

ایبوک رشته مهندسی کامپیوتر Computer Engineering غیر موجود در لیست خرید کتاب لاتین خرید کتاب زبان اصلی خرید کتاب لاتین کتاب خارجی افست خرید کتاب علمی خارجی
ایبوک رشته مهندسی کامپیوتر Computer Engineering غیر موجود در لیست خرید کتاب لاتین خرید کتاب زبان اصلی خرید کتاب لاتین کتاب خارجی افست خرید کتاب علمی خارجی

درخواست ایبوک رشته مهندسی کامپیوتر Computer Engineering غیر موجود در لیست

لیست برخی از کتاب های رشته  مهندسی  کامپیوتر Computer Engineering در زیر فراهم شده است. درصورتی که کتاب خارجی مورد نظر شما در این لیست نیست، می توانید مشخصات کتاب را برای ما ارسال کنید تا در کمتر از چند ساعت ایبوک ان برای شما فراهم می شود. راههای ارتباطی در قسمت تماس با ما می باشد.

لیست  کتاب های زبان اصلی رشته مهندسی کامپیوتر Computer Engineering

Discipline/Subject Title Author Publication Date Abstract/Summary
Computer Engineering/Embedded Systems and Programming BeagleBone Robotic Projects – Second Edition  

خرید کتاب اورجینال

6/13/2017 Exciting new capabilities to enable even easier DIY robotics with BeagleBone Blue About This Book • Build powerful robots with the all new BeagleBone Blue • Communicate with your robot and teach it to detect and respond to its environment • Control walking, rolling, swimming, and flying robots with your iOS and Android mobile devices Who This Book Is For This book is for anyone who is curious about using new, low-cost hardware to create robotic projects and have previously been the domain of research labs, major universities, or defence departments.
Computer Engineering/Digital Communications and Networking HSDPA/HSUPA for UMTS: High Speed Radio Access for Mobile Communications   Harri Holma
Antti Toskala
5/1/2016 From the editors of the highly successful WCDMA for UMTS, this new book provides a comprehensive and up-to-date reference to High Speed Packet Access (HSPA) technologies for WCDMA.The editors cover both HSDPA and HSUPA, including an in-depth description and explanation of 3GPP standards, and expected performance based on simulations and first measurements.
Computer Engineering/Digital Communications and Networking LTE Signaling: Troubleshooting and Performance Measurement – 2nd Edition   Ralf Kreher
Karsten Gaenger
1/1/2016 This extensively updated second edition of LTE Signaling, Troubleshooting and Performance Measurement describes the LTE signaling protocols and procedures for the third generation of mobile communications and beyond.It is one of the few books available that explain the LTE signaling messages, procedures and measurements down to the bit & byte level, and all trace examples are taken for a real lab and field trial traces.
Computer Engineering/Digital Communications and Networking LTE Small Cell Optimization: 3GPP Evolution to Release 13

خرید کتاب لاتین

Harri Holma
Antti Toskala
Jussi Reunanen
1/1/2016 LTE network capabilities are enhanced with small cell deployment, with optimization and with new 3GPP features.LTE networks are getting high loaded which calls for more advanced optimization.Small cells have been discussed in the communications industry for many years, but their true deployment is happening now.New 3GPP features in Release 12 and 13 further push LTE network performance.
Computer Engineering/Digital Communications and Networking The LTE-Advanced Deployment Handbook: The Planning Guidelines for the Fourth Generation Networks   Jyrki T. J. Penttinen 1/1/2016 LTE-Advanced is the new Global standard which is expected to create a foundation for the future wireless broadband services.The standard incorporates all the latest technologies recently developed in the field of wireless communications.Presented in a modular style, the book provides an introductory description for beginners as well as practical guidelines for telecom specialists.
Computer Engineering/Digital Communications and Networking Green Communications: Principles, Concepts and Practice   Konstantinos Samdanis
Peter Rost
Andreas Maeder
Michela Meo
Christos Verikoukis
9/1/2015 This book provides a comprehensive view of green communications considering all areas of ICT including wireless and wired networks.It analyses particular concepts and practices, addressing holistic approaches in future networks considering a system perspective.It makes full use of tables, illustrations, performance graphs, case studies and examples making it accessible for a wide audience.
Computer Engineering/Digital Communications and Networking Collaborative Internet of Things (C-IoT): for Future Smart Connected Life and Business   Fawzi Behmann
Kwok Wu
6/1/2015 This book provides a simplified visionary approach about the future direction of IoT, addressing its wide-scale adoption in many markets, its interception with advanced technology, the explosive growth in data, and the emergence of data analytics.IoT business applications span multiple vertical markets.The objective is to inspire creative thinking and collaboration among startups and entrepreneurs which will breed innovation and deliver IoT solutions that will positively impact us by making business processes more efficient, and improving our quality of life.
Computer Engineering/General Computer Engineering Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis   Tony UcedaVelez
Marco M. Morana
5/1/2015 This book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology.It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
Computer Engineering/General Computer Engineering Chinese Cybersecurity and Defense   Daniel Ventre 4/1/2015 Cyberdefense has become, over the past five years, a major issue on the international scene.China, by the place it occupies, is the subject of attention: it is observed, criticized, and designated by many states as a major player in the global cyber-insecurity.The United States is building their cyberdefense strategy against what they call the “Chinese threat.”
Computer Engineering/Digital Communications and Networking Assessing Information Security: Strategies, tactics, logic and framework – 2nd Edition  

خرید کتاب لاتین

1/29/2015 If anything, accelerated technological developments such as expansion of cloud networks, application services, business use of BYOD (Bring Your Own Device) and BYOA (Bring Your Own Application), together with all kinds of interconnected mobile devices, have only strengthened the strategies we have elaborated by forcing downstream security tactics to be more aligned with them. It can be consulted when you need an independent security assessment, or want to set up an internal audit team, or review your vendors’ or partner companies’ levels of security, or even run your own information security services business. Andrew has an extensive background in performing information security assessments, ranging from external and internal penetration tests, to configuration, security policies, processes and procedures reviews. On accomplishing his MBA, he co-founded information security company, Arhont Ltd, participated in security research, published articles and advisories, and greatly contributed to the overall success of the Arhont team. As a security consultancy, we are not at other information security companies’ throats.
Computer Engineering/Digital Communications and Networking LTE Standards   Jean-Gabriel Remy
Charlotte Letamendia
11/1/2014 LTE (long-term evolution) mobile communication system is offering high bitrates in IP communications.Fourth Generation Mobile Communications/LTE describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications.The book is a vital resource for the entire mobile communication community.Coverage includes: LTE standards and architecture, Radio access sub-system, Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, SIM card description, GPS driven applications, The Apple model, and much more more.
Computer Engineering/Digital Communications and Networking BeagleBone for Secret Agents   9/23/2014 If you have some experience with the BeagleBone or similar embedded systems and want to learn more about security and privacy, this book is for you.Alternatively, if you have a security and privacy background and want to learn more about embedded development, this book is for you.You should have some familiarity with Linux systems and with the C and Python programming languages.
Computer Engineering/Digital Communications and Networking From GSM to LTE-Advanced: An Introduction to Mobile Networks and Mobile Broadband – Second Edition   Martin Sauter 9/1/2014 This revised edition of Communication Systems from GSM to LTE: An Introduction to Mobile Networks and Mobile Broadband Second Edition (Wiley 2010) contains not only a technical description of the different wireless systems available today, but also explains the rationale behind the different mechanisms and implementations; not only the ‘how’ but also the ‘why’.
Computer Engineering/Digital Communications and Networking HSPA+ Evolution to Release 12  

خرید کتاب اورجینال

Harri Holma
Antti Toskala
Pablo Tapia
9/1/2014 A comprehensive reference book codifying the various standards releases for High Speed Packet Access (HSPA) wireless technology HSPA evolution has maintained its prominence through Releases 7-11 but the evolution is coming to an end with Release 12, with the focus moving to LTE.However, HSPA network and terminal sales will continue for many years: HSPA is expected to remain as the number one radio access technology from the sales point of view far beyond 2015.
Computer Engineering/Embedded Systems and Programming Building Multicopter Video Drones   8/26/2014 This book is for a wide range of individuals who are looking to shoot aerial footage with a multicopter.No previous flying experience is assumed, but even the most expert flyers will find unexpected and interesting information.
Computer Engineering/Digital Communications and Networking Arduino Networking   8/21/2014 This book is intended for those who want to build their own network-connected projects using the Arduino platform.You will be able to build exciting projects that connect to your local network and the Web.You will need to have some basic experience in electronics and web programming languages.You will also need to know the basics of the Arduino platform as the projects mainly deal with the networking aspects of the Arduino Ethernet shield.
Computer Engineering/Embedded Systems and Programming Arduino Robotic Projects   8/14/2014 This book is for anyone who has been curious about using Arduino to create robotic projects that were previously the domain of research labs of major universities or defense departments.Some programming background is useful, but if you know how to use a PC, you can, with the aid of the step-by-step instructions in this book, construct complex robotic projects that can roll, walk, swim, or fly.
Computer Engineering Arduino Home Automation Projects   7/23/2014 This book is divided into projects that are explained in a step-by-step format, with practical instructions that are easy to follow.If you want to build your own home automation systems wirelessly using the Arduino platform, this is the book for you.You will need to have some basic experience in Arduino and general programming languages, such as C and C++ to understand the projects in this book.
Computer Engineering/Embedded Systems and Programming Embedded Linux Development with Yocto Project   7/9/2014 A practical tutorial guide which introduces you to the basics of Yocto Project, and also helps you with its real hardware use to boost your Embedded Linux-based project.If you are an embedded systems enthusiast and willing to learn about compelling features offered by the Yocto Project, then this book is for you.With prior experience in the embedded Linux domain, you can make the most of this book to efficiently create custom Linux-based systems.
Computer Engineering/Digital Communications and Networking An Introduction to LTE: LTE, LTE-Advanced, SAE, VoLTE and 4G Mobile Communications – 2nd Edition   Christopher Cox 7/1/2014 Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works.The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe.The book assumes no more than a basic knowledge of mobile telecommunication systems, and the reader is not expected to have any previous knowledge of the complex mathematical operations that underpin LTE.
Computer Engineering/General Computer Engineering Cyber Threat!: How to Manage the Growing Risk of Cyber Attacks   MacDonnell Ulsch 7/1/2014 Conquering cyber attacks requires a multi-sector, multi-modal approach Cyber Threat!How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity.Written by one of the nation’s most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences.
Computer Engineering/General Computer Engineering Cybersecurity for Executives: A Practical Guide   Gregory J. Touhill
C. Joseph Touhill
7/1/2014 Practical guide that can be used by executives to make well-informed decisions on cybersecurity issues to better protect their business Emphasizes, in a direct and uncomplicated way, how executives can identify, understand, assess, and mitigate risks associated with cybersecurity issues Covers ‘What to Do When You Get Hacked?’ including Business Continuity and Disaster Recovery planning, Public Relations, Legal and Regulatory issues, and Notifications and Disclosures Provides steps for integrating cybersecurity into Strategy; Policy and Guidelines; Change Management and Personnel Management Identifies cybersecurity best practices that executives can and should use both in the office and at home to protect their vital information
Computer Engineering/Embedded Systems and Programming Internet of Things with the Arduino Yún  

خرید کتاب لاتین

5/21/2014 All projects are explained in a stepbystep manner, always starting with the assembly of the hardware and followed by basic tests of every hardware component.You will then learn how to build exciting applications in a practical manner based on the details of the projects.This book is intended for people who already have some experience with the Arduino platform and who want to build more exciting applications, in particular to Internet of Things.
Computer Engineering/General Computer Engineering Dictionary of Computer Vision and Image Processing – 2nd Edition   Robert B. Fisher
Toby P. Breckon
Kenneth Dawson-Howe
Andrew Fitzgibbon
Craig Robertson
Emanuele Trucco
Christopher K. I. Williams
1/1/2014 Written by leading researchers, the 2nd Edition of the Dictionary of Computer Vision & Image Processing is a comprehensive and reliable resource which now provides explanations of over 3500 of the most commonly used terms across image processing, computer vision and related fields including machine vision.It offers clear and concise definitions with short examples or mathematical precision where necessary for clarity that ultimately makes it a very usable reference for new entrants to these fields at senior undergraduate and graduate level, through to early career researchers to help build up knowledge of key concepts.
Computer Engineering/Embedded Systems and Programming BeagleBone Robotic Projects   12/26/2013 Develop practical example projects with detailed explanations; combine the projects in a vast number of ways to create different robot designs, or work through them in sequence to discover the full capability of the BeagleBone Black.This book is for anyone who is curious about using new, low-cost hardware to create robotic projects that have previously been the domain of research labs, major universities or Defence departments.
Computer Engineering BeagleBone Home Automation   12/24/2013 An easy-to-follow guide full of hands-on examples to help  transform your house into a standalone home automation solution.If  you are looking for ways to create a highly capable home automation  system that is easily extendable and highly configurable, then this  book is for you.Basic knowledge of electronics and programming in  Python and/or Java languages will be helpful, but not  mandatory.
Computer Engineering Building a Home Security System with BeagleBone   12/17/2013 Building a Home Security System with BeagleBone is a practical, hands-on guide for practical, hands-on people.The book includes step-by-step instructions for assembling your own hardware on professionally manufactured PCB’s and setting up the software on your system.This book is for anyone who is interested in alarm systems and how they work; for hobbyists and basement tinkerers who love to build things.
Computer Engineering/Embedded Systems and Programming Instant Optimizing Embedded Systems using Busybox   11/25/2013 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks.A step-by-step guide which provides concise and clear recipes for getting started with Busybox.If you are an embedded system developer or Android developer who wishes to learn to build an embedded (Android Linux) system from scratch, as well as to optimize the system performance, then this book will be great for you.
Computer Engineering/Digital Communications and Networking An Introduction to Information Security and ISO27001:2013 – A Pocket Guide – 2nd Edition   10/3/2013 Written by an acknowledged expert on the new ISO27001 standard, An Introduction to information security and ISO27001:2013 is the ideal resource for anyone wanting a clear, concise and easy-to-read primer on information security.It will ensure the systems you put in place are effective, reliable and auditable.This pocket guide will help you to: Make informed decisions, use this guide will enable the key people in your organisation to make better decisions before embarking on an information security project, Ensure everyone is up to speed, Use this guide to give the non-specialists on the project board and in the project team a clearer understanding of what the project involves, Raise awareness among staff, Use this guide to make sure your people know what is at stake with regard to information security and understand what is expected of them, Enhance your competitiveness, Use this guide to let your customers know that the information you hold about them is managed and protected appropriately.
Computer Engineering/Embedded Systems and Programming Instant Buildroot  

خرید کتاب اورجینال

9/25/2013 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks.A concise guide full of step-by-step recipes to help you learn how to generate and configure an embedded Linux system using Buildroot.Instant Buildroot is for developers who want to know how to use Buildroot tools to generate and configure their own embedded system.
Computer Engineering/Embedded Systems and Programming Instant LEGO MINDSTORMS EV3   9/25/2013 Filled with practical, step-by-step instructions and clear explanations for the most important and useful tasks.A concise guide full of step-by-step recipes to teach you how to build and program an advanced robot.”Instant LEGO Mindstorm EV3″ is for both the adult tinkerer who has never touched LEGO before and the experienced LEGO engineer who has evolved from Mindstorm NXT to EV3.
Computer Engineering/General Computer Engineering The True Cost of Information Security Breaches and Cyber Crime   7/16/2013 Most businesses are now aware of the importance of information security.However, some organisations struggle to understand what an information security breach would mean from a business management point of view.This can lead to organisations investing in expensive solutions which may not necessarily address their requirements.This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face.
Computer Engineering/Digital Communications and Networking Building the Internet of Things with IPv6 and MIPv6: The Evolving World of M2M Communications   Daniel Minoli 7/1/2013 “If we had computers that knew everything there was to know about things—using data they gathered without any help from us—we would be able to track and count everything, and greatly reduce waste, loss, and cost.We would know when things needed replacing, repairing or recalling, and whether they were fresh or past their best.The Internet of Things has the potential to change the world, just as the Internet did.
Computer Engineering/Embedded Systems and Programming Instant OpenELEC Starter   6/3/2013 Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.A tangible and easy-to-follow guide on installation and basic configuration of a home media center, allowing for the completion of the process without having to look elsewhere for additional information, and within a relatively limited timespan.
Computer Engineering/Embedded Systems and Programming C Programming for Arduino   5/17/2013 Written as a practical Packt book brimming with engaging examples, C Programming for Arduino will help those new to the amazing open source electronic platform so that they can start developing some great projects from the very start.This book is great for people who want to learn how to design & build their own electronic devices.From interaction design art school students to the do-it-yourself hobbyist, or even simply people who want to learn electronics, this book will help by adding a new way to design autonomous but connected devices.
Computer Engineering/General Computer Engineering Turning Heads and Changing Minds – Transcending IT Auditor Archetypes   3/7/2013 Turning Heads and Changing Minds provides the IT auditor (student or practitioner) with an understanding of soft skills.It takes a hard look at common auditor perceptions that can hinder an audit and offers practical techniques for overcoming them.Rather than issue a list of ‘should dos’, the book offers the reader an intuitive, organic approach, with real-life IT scenarios involving general computer, application and third-party controls at various stages of an audit life cycle.
Computer Engineering/Digital Communications and Networking 3G, 4G and Beyond: Bringing Networks, Devices and the Web Together – 2nd Edition   2013 Extensively updated evaluation of current and future network technologies, applications and devices  This book follows on from its successful predecessor with an introduction to next generation network technologies, mobile terminalsdevices, voice and multimedia services and the mobile web 2.0.Giving a sound technical introduction to 3GPP wireless systems, this book explains the decisions taken during standardization of the most popular wireless network standards today, LTE, LTE-Advanced and HSPA+.
Computer Engineering/Digital Communications and Networking Cognitive Radio Communication and Networking: Principles and Practice  

خرید کتاب اورجینال

2013 A comprehensive examination of the basic mathematical tools,  progressing to more advanced concepts and discussions about the  future of cognitive radio   Cognitive radio is a paradigm for wireless communication  in which either a network or a wireless node changes its  transmission or reception parameters to communicate efficiently  avoiding interference with licensed or unlicensed users.
Computer Engineering/Embedded Systems and Programming Embedded Systems: Hardware Design and Implementation   2013 Covers the significant embedded computing  technologies—highlighting their applications in wireless  communication and computing power  An embedded system is a computer system designed for specific  control functions within a larger system—often with real-time  computing constraints.It is embedded as part of a complete device  often including hardware and mechanical parts.
Computer Engineering Safety Management of Software-based Equipment   2013 Systems based on programmable electronics are being used  increasingly and can make the tackling of safety even more  challenging.Electronics is characterized by faults, referred to as  random, that can appear at any time, but can be predicted with  probabilities  these are systematic faults (design, errors,  misunderstandings, software faults, etc.).
Computer Engineering/Digital Communications and Networking Understanding LTE with MATLAB: From Mathematical Modeling to Simulation and Prototyping   2013 An introduction to technical details related to the Physical  Layer of the LTE standard with MATLAB  The LTE (Long Term Evolution) and LTE-Advanced are among the  latest mobile communications standards, designed to realize the  dream of a truly global, fast, all-IP-based, secure broadband  mobile access technology.This book examines the Physical Layer (PHY) of the LTE standards  by incorporating three conceptual elements: an overview of the  theory behind key enabling technologies; a concise discussion  regarding standard specifications; and the MATLAB algorithms  needed to simulate the standard.
Computer Engineering/Digital Communications and Networking LTE Security – 2nd Edition   Dan Forsberg
Gunther Horn
Wolf-Dietrich Moeller
Valtteri Niemi
12/1/2012 A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful LTE Security addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems.
Computer Engineering/General Computer Engineering The Quantum Age of IT – Why everything you know about IT is about to change  

خرید کتاب لاتین

11/29/2012 In The Quantum Age of IT, Charles Araujo examines what has led us to this point and what it means to the future of IT organisations.With a broad perspective on the fundamental changes affecting the industry, he offers practical guidance that every IT professional needs to compete in this new era of IT.Whether you are an IT executive, or just beginning your career, this book will offer you the key insights you need to understand what is happening and what is coming.
Computer Engineering/Digital Communications and Networking LTE Advanced: 3GPP Solution for IMT-Advanced   Harri Holma
Antti Toskala
10/1/2012 From the editors of the highly successful LTE for UMTS: Evolution to LTE-Advanced, this new book examines the main technical enhancements brought by LTE-Advanced, thoroughly covering 3GPP Release 10 specifications and the main items in Release 11.Using illustrations, graphs and real-life scenarios, the authors systematically lead readers through this cutting-edge topic to provide an outlook on existing technologies as well as possible future developments.
Computer Engineering/Digital Communications and Networking Securing Cloud Services – A pragmatic approach to security architecture in the Cloud   7/24/2012 This book provides an overview of security architecture processes and explains how they may be used to derive an appropriate set of security controls to manage the risks associated with working in the Cloud.Part 1 introduces Cloud Computing and describes the main service models (IaaS, PaaS and SaaS) and deployment models (public, private, community and hybrid) as defined by NIST.
Computer Engineering/Digital Communications and Networking Smart Technologies for Communication   6/28/2012 The conference, of which these are the proceedings, was intended to bring together researchers and engineers/technologists working on diverse aspects of materials, mechanics, electronics, computers, communications and other topics.The peer-reviewed papers are grouped into chapters on: Computer Networks and Communication Engineering; Machinery, Electrical and Electronic Equipment, Technology; Computer Theory, Software and Computer Technologies; Signal Processing.
Computer Engineering/Digital Communications and Networking Penetration Testing – Protecting Networks and Systems   6/21/2012 This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization’s computer systems.Key areas covered include: The primary phases of pen testing – reconnaissance, enumeration, vulnerability assessment and the eventual launch of an attack, The preparation of the test report – what information to include in the report and how best to present it to the client, The introduction of new technology ­- how it can improve business operations (e.g. employee remote access, wireless communications, public-facing web applications), but, at the same time, create new vulnerabilities.
Computer Engineering/Embedded Systems and Programming Embedded SoPC Design with Nios II Processor and Verilog Examples  

خرید کتاب اورجینال

مه, 2012 Explores the unique hardware programmability of FPGA-based  embedded systems, using a learn-by-doing approach to introduce the  concepts and techniques for embedded SoPC design with Verilog  An SoPC (system on a programmable chip) integrates a processor,  memory modules, I/O peripherals, and custom hardware accelerators  into a single FPGA (field-programmable gate array) device.
Computer Engineering/Digital Communications and Networking Cloud Computing – Assessing the risks   4/17/2012 Cloud Computing: Assessing the risks answers these questions and many more.Using jargon-free language and relevant examples, analogies and diagrams, it is an up-to-date, clear and comprehensive guide the security, governance, risk, and compliance elements of Cloud Computing.Written by three internationally renowned experts, this book discusses the primary concerns of most businesses leaders – the security and risk elements of the Cloud.
Computer Engineering/General Computer Engineering Cyber Security Policy Guidebook   Jennifer L. Bayuk
Jason Healey
Paul Rohmeyer
Marcus H. Sachs
Jeffrey Schmidt
Joseph Weiss
4/1/2012 Drawing upon a wealth of experience from academia, industry, and government service, Cyber Security Policy Guidebook details and dissects, in simple language, current organizational cyber security policy issues on a global scale—taking great care to educate readers on the history and current approaches to the security of cyberspace.It includes thorough descriptions—as well as the pros and cons—of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone.
Computer Engineering/Digital Communications and Networking 21st Century Chinese Cyberwarfare   3/5/2012 21st Century Chinese Cyberwarfare draws from a combination of business, cultural, historical and linguistic sources, as well as the author’s personal experience, to attempt to explain China to the uninitiated.The objective of the book is to present the salient information regarding the use of cyber warfare doctrine by the People’s Republic of China to promote its own interests and enforce its political, military and economic will on other nation states.
Computer Engineering/Digital Communications and Networking The Internet of Things: Key Applications and Protocols – 2nd Edition   Olivier Hersent
David Boswarthick
Omar Elloumi
2/1/2012 An all-in-one reference to the major Home Area Networking, Building Automation and AMI protocols, including 802.15.4 over radio or PLC, 6LowPAN/RPL, ZigBee 1.0 and Smart Energy 2.0, Zwave, LON, BACNet, KNX, ModBus, mBus, C.12 and DLMS/COSEM, and the new ETSI M2M system level standard.In-depth coverage of Smart-grid and EV charging use cases.This book describes the Home Area Networking, Building Automation and AMI protocols and their evolution towards open protocols based on IP such as 6LowPAN and ETSI M2M.
Computer Engineering/Digital Communications and Networking An Introduction to Hacking and Crimeware – A Pocket Guide   1/19/2012 An Introduction to Hacking Crimeware is a comprehensive guide to the more serious threats.Knowing about these threats will help you understand how to ensure that your computer systems are protected and that your business is safe, enabling you to focus on your core activities.In this pocket guide, the author: defines exactly what crimeware is – both intentional and unintentional – and gives specific, up-to-date examples to help you identify the risks and protect your business, explores the increasing use of COTS tools as hacking tools, exposing the enemy’s tactics gives practical suggestions as to how you can fight back, provides a valuable list of up-to-date, authoritative sources of information, so you can stay abreast of new developments and safeguard your business.
Computer Engineering/General Computer Engineering The ITSM Iron Triangle – Incidents, changes and problems   1/5/2012 This innovative work of fiction demonstrates how ITIL® best practice can ensure the success of your IT process implementation projects.It is based on real-life, up-to-date situations and offers vital strategies to implement the most important aspects of ITIL into your business and to tailor them to your organisation’s particular needs.
Computer Engineering/Digital Communications and Networking Networks and Services: Carrier Ethernet PBT MPLS-TP and VPLS  

خرید کتاب اورجینال

2012 This book provides a comprehensive understanding of current and  debated future networking technologies.It gives insight into  building end-to-end networks and services with Carrier Ethernet,  PBT, MPLS-TP, and VPLS while also shedding light on the pros and  cons of these technologies for service providers and enterprise  network owners.Focusing on layer-2 networking and services, Networks and  Services covers:    The basics of Ethernet such as protocol stack, bridges,  switches, and hubs  Key techniques that are being used in building carrier-class  Carrier Ethernet networks and services like synchronization,  pseudowires, and protection  Carrier Ethernet network architectures and services that are  currently deployed in the industry  Traffic management and OAM capabilities of Carrier  Ethernet  Circuit Emulation Services  PBB and PBT to resolve possible scalability issues of Carrier  Ethernet  Technologies that are competing or working with Carrier  Ethernet in forming data networks and services, Transport MPLS,  MPLS Transport Profile, and VPLS    Networks and Services: Carrier Ethernet, PBT, MPLS-TP, and  VPLS is ideal for network architects, engineers, and planning  professionals in telecommunications, as well as students and  researchers in related disciplines.
Computer Engineering/Digital Communications and Networking Voice over LTE (VoLTE)   2012 Describes the technological solutions and standards which will  enable the migration of voice and SMS services over to LTE/EPC  networks   Main drivers for the introduction of Long Term Evolution of  UTRAN (LTE) is to provide far better end user experience for mobile  broadband services.However, service providers also need to have a  clear strategy of how to offer voice and messaging services for  consumers and enterprises.
Computer Engineering/General Computer Engineering RFID and the Internet of Things   Harvé Chabanne
Pascal Urien
Jean-Ferdinand Susini
6/1/2011 RFID (Radio Frequency Identification) technology allows for automatic identification of information contained in a tag by scanning and interrogation using radio frequency (RF) waves.An RFID tag contains an antenna and a microchip that allows it to transmit and receive.This technology is a possible alternative to the use of barcodes, which are frequently inadequate in the face of rapid growth in the scale and complexity of just-in-time inventory requirements, regional and international trade, and emerging new methods of trade based on it.
Computer Engineering/General Computer Engineering The Chief Information Security Officer – Insights, tools and survival skills   5/5/2011 The CISO has overall responsibility for corporate security strategy, but today’s CISO has to be in the business of managing information, not just securing it.The successful CISO needs to have excellent communication and presentation skills, and to demonstrate keen business acumen.The serious and ever-changing nature of today’s security threats demand a strategic-minded response, and a successful CISO will always be thinking about how to gain business objectives through enabling technology while properly managing risk.
Computer Engineering/Digital Communications and Networking LTE for UMTS: Evolution to LTE-Advanced – 2nd Edition   4/1/2011 Written by experts actively involved in the 3GPP standards and product development, LTE for UMTS, Second Edition gives a complete and up-to-date overview of Long Term Evolution (LTE) in a systematic and clear manner.Building upon on the success of the first edition, LTE for UMTS, Second Edition has been revised to now contain improved coverage of the Release 8 LTE details, including field performance results, transport network, self optimized networks and also covering the enhancements done in 3GPP Release 9.
Computer Engineering/Digital Communications and Networking Cooperative Networking   2011 This book focuses on the latest trends and research results in  Cooperative Networking   This book discusses the issues involved in cooperative  networking, namely, bottleneck resource management, resource  utilization, servers and content, security, and so on.In addition,  the authors address instances of cooperation in nature which  actively encourage the development of cooperation in  telecommunication networks.
Computer Engineering/Digital Communications and Networking The Handbook of MPEG Applications: Standards in Practice  

خرید کتاب اورجینال

Marios C. Angelides
Harry Agius
12/1/2010 This book provides a comprehensive examination of the use of MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A standards, providing a detailed reference to their application.In this book, the authors address five leading MPEG standards: MPEG-2, MPEG-4, MPEG-7, MPEG-21, and MPEG-A, focusing not only on the standards themselves, but specifically upon their application (e.g. for broadcasting media, personalised advertising and news, multimedia collaboration, digital rights management, resource adaptation, digital home systems, and so on); including MPEG cross-breed applications.
Computer Engineering/Digital Communications and Networking Email Security – A Pocket Guide   11/30/2010 Your business relies on e-mail for its everyday dealings with partners, suppliers and customers.While e-mail is an invaluable form of communication, it also represents a potential threat to your information security.E-mail could become the means for criminals to install a virus or malicious software on your computer system and fraudsters will try to use e-mails to obtain sensitive information through phishing scams.
Computer Engineering/Digital Communications and Networking Cloud Security and Governance – Who’s on your cloud?   10/21/2010 The rise of Cloud Computing, with services delivered “in the cloud”, offers businesses incredible power and flexibility.It promises the efficient use of human and financial capital resources, reducing infrastructure and operation costs.It proposes a model of computing that is effective at meeting the demands of business in a rapidly changing environment
Computer Engineering/Digital Communications and Networking WCDMA for UMTS: HSPA Evolution and LTE – 5th Edition   9/1/2010 Now in its fifth edition, the bestselling book on UMTS has been updated to cover 3GPP WCDMA and High Speed Packet Access (HSPA) from Release 99 to Release 9.Written by leading experts in the field, the book explains HSPA performance based on simulations and field experience, and illustrates the benefits of HSPA evolution (HSPA+) both from the operators and from the end user?s perspective.
Computer Engineering/Digital Communications and Networking Information Security Risk Management for ISO27001/ISO27002  

خرید کتاب لاتین

4/27/2010 The requirements for an ISMS are specified in ISO27001.Under ISO27001, a risk assessment has to be carried out before any controls can be selected and implemented, making risk assessment the core competence of information security management.This book provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO27001.
Computer Engineering/Digital Communications and Networking Data Protection Compliance in the UK – A Pocket Guide – 2nd Edition   4/6/2010 Data Protection Compliance in the UK has been published to be an easy-read introduction for any employee required to support compliance with the DPA.This concise book covers: UK and EU data protection regulations, The rights of individuals, The security obligations of organisation, Key definitions, terms and requirements, Practical compliance check-lists, covering the steps you must take to reach DPA compliance, Additional topics including IT monitoring and interception, enforcement provisions and penalties for non-compliance.
Computer Engineering/Digital Communications and Networking Assessing Information Security – Strategies, Tactics, Logic and Framework   3/4/2010 Assessing Information Security deals with the philosophy, strategy and tactics of soliciting, managing and conducting information security audits of all flavours.It will give you the founding principles around information security assessments and why they are important.The book provides a fluid framework for developing an astute ‘information security mind’ capable of rapid adaptation to evolving technologies, markets, regulations, laws, and so on.
Computer Engineering/Digital Communications and Networking Cyber Risks for Business Professionals – A Management Guide   1/8/2010 Cyber Risks for Business Professionals: A Management Guide is a general guide to the origins of cyber risks and to developing suitable strategies for their management.It provides a breakdown of the main risks involved and shows you how to manage them.Covering the relevant legislation on information security and data protection, the author combines his legal expertise with a solid, practical grasp of the latest developments in IT to offer a comprehensive overview of a highly complex subject.
Computer Engineering/Embedded Systems and Programming Advances in Cognitive Systems   S. Nefti
J. O. Gray
2010 The book has 17 chapters and deals with the following subjects: cognitive robotics system; adaptive systems; dynamical enactive cognitive architecture; cooperative decision model; virtual humans; neurocomputational cognitive architectures; robotic agents; neural networks; investor behavior; swarm intelligence techniques and distributive cognition.
Computer Engineering/Digital Communications and Networking LTE – The UMTS Long Term Evolution: From Theory to Practice – 2nd Edition  

خرید کتاب اورجینال

2010 Where this book is exceptional is that the reader will  learn not just how LTE works but why it works.Adrian  Scrase, ETSI Vice-President, International Partnership Projects   The first edition of this book is globally recognized as the  ultimate reference book on LTE.Following the success of it  predecessor, this second edition is fully updated, covering the  latest additions to LTE and a full description of  LTE-Advanced.
Computer Engineering/General Computer Engineering Random Data: Analysis and Measurement Procedures – 4th Edition   2010 A timely update of the classic book on the theory and  application of random data analysis   First published in 1971, Random Data served as an  authoritative book on the analysis of experimental physical data  for engineering and scientific applications.This Fourth  Edition features coverage of new developments in random data  management and analysis procedures that are applicable to a broad  range of applied fields, from the aerospace and automotive  industries to oceanographic and biomedical research.
Computer Engineering/Embedded Systems and Programming Smart Card Handbook 4th Edition Complete Document   2010 The most comprehensive book on state-of-the-art smart card  technology available   Updated with new international standards and specifications,  this essential fourth edition now covers all aspects of smart card  in a completely revised structure.Its enlarged coverage now  includes smart cards for passports and ID cards, health care cards,  smart cards for public transport, and Java Card 3.0.
Computer Engineering/Digital Communications and Networking Wireless Communications – 2nd Edition   2010 “Professor Andreas F. Molisch, renowned researcher and educator,  has put together a comprehensive, clear, and authoritative book on  wireless communications.The Second Edition, which includes a  wealth of new material on important emerging topics, ensures the  book will continue to be a key resource for every student,  researcher, and practitioner in the field.”
Computer Engineering/Digital Communications and Networking Information Security Breaches – Avoidance and Treatment based on ISO27001   12/9/2009 If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue.This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur.In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001.
Computer Engineering/Digital Communications and Networking The Definitive Guide to the C&A Transformation Process – The First Publication of a Comprehensive View of the C&A Transformation   10/6/2009 The Definitive Guide to the C&A Transformation provides an authoritative guide to authorization for persons with knowledge of information systems and/or information systems security, but not necessarily the same level of expertise with certification and accreditation (C&A) standards and best practices; it points to references for further knowledge.
Computer Engineering/Digital Communications and Networking Mobile Security – A Pocket Guide   7/16/2009 This pocket guide gives you clear and reliable guidance on how to protect the information contained in your mobile phone.Written by one of the country’s top academic experts on information security, the guide covers such topics as safeguarding data through encryption, establishing a virtual private network (VPN) to create a secure way for your staff to connect to the server on a remote device, and countering the growing threat on mobile platforms of SMS-phishing and malware.
Computer Engineering/General Computer Engineering MOLECULAR REALIZATIONS OF QUANTUM COMPUTING 2007   6/12/2009 This book provides an overview on physical realizations of quantum computing by means of molecular systems.It will be useful for graduate students and researchers interested in quantum computing from different areas of physics, physical chemistry, informatics and computer science.Each chapter is written in a self-contained manner and hence can be accessible for researchers and graduate students with even less background in the topics.
Computer Engineering/Digital Communications and Networking CyberWar, CyberTerror, CyberCrime – A Guide to the Role of Standards in an Environment of Change and Danger   4/17/2009 CyberWar, CyberTerror, CyberCrime introduces readers to the practical use of standards and best practices to address significant security problems, such as those presented by cyberwar, cyberterror, and cybercrime.It also identifies a body of knowledge essential to acquire, develop, and sustain a secure information environment.This book provides a new context for addressing some of the broader challenges of security.
Computer Engineering/General Computer Engineering The Insider Threat – Combatting the Enemy Within  

خرید کتاب اورجینال

4/7/2009 How exposed is your company to the risk of a malicious attack by a discontented or psychologically unbalanced employee?What precautions have you taken to ensure that your IT systems cannot be manipulated for purposes of insider fraud?What steps do you need to take to prevent your IT systems from falling prey to organized crime through someone who has been planted within your firm or someone who is being threatened or bribed?
Computer Engineering/Digital Communications and Networking How to Survive a Data Breach – A Pocket Guide   2/17/2009 Data breaches are becoming a fact of life.As companies retain more data on clients, and data collection becomes more centralised, the risk of multiple records going missing increases.If your organisation gets hit by a data breach, then the way you respond will have a huge impact on your ability to recover.For this reason, forward planning is essential.
Computer Engineering/Digital Communications and Networking Hadamard Transforms   2009 The Hadamard matrix and Hadamard transform are fundamental problem-solving tools in a wide spectrum of scientific disciplines and technologies, such as communication systems, signal and image processing (signal representation, coding, filtering, recognition, and watermarking), digital logic (Boolean function analysis and synthesis), and fault-tolerant system design.
Computer Engineering/Embedded Systems and Programming Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing 3rd Edition  

خرید کتاب لاتین

2009 Proven tips and tools for building and executing an effective  test project  Earlier editions of this book have helped test managers around  the world to develop essential tools and apply them to successful  test project management.In this third edition of his bestseller,  Rex Black shares lessons he has learned in the decade since the  first edition came out and provides a thorough review of the latest  tools and resources, making this book even more valuable.
Computer Engineering/General Computer Engineering Non-Binary Error Control Coding for Wireless Communication and Data Storage   2009 Comprehensive introduction to non-binary error-correction coding  techniques   Non-Binary Error Control Coding for Wireless Communication  and Data Storage explores non-binary coding schemes that have  been developed to provide an alternative to the Reed   Solomon codes, which are expected to become unsuitable for use in  future data storage and communication devices as the demand for  higher data rates increases.
Computer Engineering/Digital Communications and Networking Transceiver and System Design for Digital Communications   Scott R. Bullock 2009 The book covers the following topics: transceiver design; transmitter; receiver; AGC design and PLL comparison; demodulation; basic probability and pulse theory; multipath; improving the system against jammers; global navigation satellite systems; satellite communications; broadband communications and networking; and direction finding and interferometer analysis.
Computer Engineering The Governance of Green IT – The Role of Processes in Reducing Data Center Energy Requirements   12/11/2008 This book’s message has nothing to do with greenwash.It is intended for people who are looking for hard, practical advice on how to fix a problem.Green IT needs to establish baseline data so that progress can be effectively tracked, and metrics are essential for that.Taking Green IT seriously also means coming up with a plan and making sure it gets delivered.
Computer Engineering/Digital Communications and Networking Data Protection vs. Freedom of Information – Access and Personal Data   11/19/2008 Freedom of information is often mentioned in the same breath as data protection.In fact, the legal position is more complicated.Whereas data protection is about protecting individuals, freedom of information is about open government.The Data Protection Act is mainly concerned with the confidentiality and security of information, but the purpose of the Freedom of Information Act is to encourage the disclosure of information.
Computer Engineering/Digital Communications and Networking Information Security Law – The Emerging Standard for Corporate Compliance  

خرید کتاب اورجینال

10/7/2008 Information Security Law: The Emerging Standard for Corporate Compliance is designed to help companies understand this developing law of information security, the obligations it imposes on them, and the standard for corporate compliance that appears to be developing worldwide.This book takes a high level view of the multitude of security laws and regulations, and summarizes the global legal framework for information security that emerges from them.
Computer Engineering/Digital Communications and Networking Application security in the ISO27001 Environment   4/10/2008 Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001.It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001.Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines.
Computer Engineering/Digital Communications and Networking Operational Research and Networks   2008 This book presents the principal concepts of operations research  (OR) as tools for the planning, support and management of various  types of networks, including both physical and logical networks.Or analyzes real problems in two stages: the formalization of a  mathematical model, followed by a solution procedure, which is in  general algorithmic. it therefore consists of a collection of  models for many application areas, together with the corresponding  solution techniques. there are two important categories of models:  those based on an algebraic formalism and those using the concepts  of graphs. both concepts are presented in detail in this book,  along with general solution 0rocedures.
Computer Engineering/General Computer Engineering The Handbook of Information and Computer Ethics   2008 Discover how developments in information technology are raising new  ethical debates   Information and computer ethics has emerged as an important area  of philosophical and social theorizing, combining conceptual,  meta-ethical, normative, and applied elements.As a result,  academic interest in this area has increased dramatically,  particularly in computer science, philosophy, and communications  departments; business schools; information and library schools; and  law schools.
Computer Engineering/General Computer Engineering SEMICONDUCTOR MACROATOMS: BASICS PHYSICS AND QUANTUM-DEVICE APPLICATIONS   11/10/2005 This book discusses the basic physics of semiconductor macroatoms at the nanoscale as well as their potential application as building blocks for the realization of new-generation quantum devices.It provides a review on state-of-the art fabrication and characterization of semiconductor quantum dots aimed at implementing single-electron/exciton devices for quantum information processing and communication.
Computer Engineering/General Computer Engineering Smart Technology for Aging Disability and Independence : The State of the Science   2005 Independent living with smart technologies   Smart Technology for Aging, Disability, and Independence: The  State of the Science brings together current research and  technological developments from engineering, computer science, and  the rehabilitation sciences, detailing how its applications can  promote continuing independence for older persons and those with  disabilities.
Computer Engineering Systems Analysis and Design with UML Version 2.0: An Object-Oriented Approach 2nd Edition  

خرید کتاب لاتین

2005 The analysis phase answers the questions of who will use the system, what the system will do, and where and when it will be used. This is the phase that usually gets the most attention, because for most systems it is longest and most expensive single part of the development process. There is much debate over which should come first, the processes or the data, because both are important to the system. Although phased development–based methodologies enable users to interact with the system early in the process, we have observed that project teams who follow these tend to devote less attention to the analysis of the complete problem domain than they might using others. Therefore, the developer would have to choose which method should be called instead of allowing the system to do it.
Computer Engineering/General Computer Engineering Trusted Computing   Chris Mitchell 2005 This book is designed to provide an introduction to trusted computing technology and its applications.It is divided into four main parts, as follows: 1.Introduction to trusted computing; 2.Trusted computing technologies; 3.Applications of trusted computing; and 4.The future of trusted computing.The first part consists of three chapters, each approaching trusted computing from a somewhat different perspective.
Computer Engineering/Embedded Systems and Programming BOWMAN:ALGORITHMS & DATA STRUCTURES   10/5/2004 Preface This book instructs readers on the science of developing and analyzing algorithms.It is intended for use in a one- or two-semester undergraduate course in data structures.The text focuses on both the theoretical and practical aspects of algorithm development.It discusses problem-solving techniques and introduces the concepts of data abstraction and algorithm efficiency.
Computer Engineering/Embedded Systems and Programming The Analysis of Algorithms   7/1/2004 Preface Computers have undergone phenomenal improvement in speed, availability, and price.This has resulted in a great deal of emphasis being placed on rapid development of correct programs, with performance playing a secondary role.Nevertheless, there are many problems for which a naIve approach is so inefficient that it is unsuitable for even the fastest and cheapest computers.
Computer Engineering/Digital Communications and Networking Local Access Network Technologies   Paul France 2004 The work presented in this book reviews the major new access technologies that are finding their way into significant use.The book is a compilation of chapters written by several contributors, all of whom have extensive experience in the field and are internationally recognised for their work.By and large, the authors are based or associated with BT’s development facilities, now known as BT Exact, at Adastral Park, near Ipswich in the UK.
Computer Engineering/Digital Communications and Networking Intelligent Networks: Principles and Applications  

خرید کتاب اورجینال

John Anderson 2002 The purpose of this book is to give some practical insight into how public telecommunications networks have advanced from the old days of offering just simple telephony services to becoming today’s ‘intelligent’ networks.Telephone companies now operate in an intensely competitive environment, and so they have to constantly struggle to find more ways to encourage customers to make ever more use of the installed network equipment.
Computer Engineering/Embedded Systems and Programming Smart Card Manufacturing: A Practical Guide   2002 The smart card industry is booming as demand for data protection  increases.From secure e-commerce and mobile communications to  electronic tracking and ticketing systems, smart card technology  facilitates a broad array of applications.This practical guide  bridges the gap between smart card applications and software,  providing an accessible introduction to a versatile technology.
Computer Engineering Integrated Converters: D to A and A to D Architectures, Analysis and Simulation   1/25/2001 Preface Digital technologies aim towards ever smaller, faster, less consuming transistors to lead to increasingly complex integrated digital systems.Consequently, many of the functions obtained through the use of analog integrated circuits are now entrusted to digital circuits.This has reaped substantial benefits regarding accuracy with no sensible penalty as far as area and power consumption are concerned.
Computer Engineering/General Computer Engineering Enterprise Application Integration: A Wiley Tech Brief   2001 Learn to utilize today’s hottest EAI technologies to ensure  interoperability across your organization What exactly is  enterprise application integration (EAI)?What makes this $300  million market so hot that it’s expected to grow to $6.5 billion in  the next two years?How do you apply it in the real world?Whether  you’re an IT professional or systems architect, business manager or  software developer, if you’re looking into EAI as a solution for  unifying applications and systems across the enterprise, then the  answers are in this book.
Computer Engineering/General Computer Engineering Digital Signal Processing: Spectral Computation and Filter Design   11/30/2000 PREFACE This text is intended for use in a first course on digital signal processing (DSP), typically in senior or first-year graduate level.It may also be useful to engineers and scientists who use digital computers to process measured data.Some elementary knowledge on signals and systems is helpful but is not necessary.An attempt has been made to make this text as self-contained as possible.
Computer Engineering/General Computer Engineering MOLECULAR DYNAMICS ON PARALLEL COMPUTERS   2/22/2000 Molecular dynamics is a well-established technique for simulating complex many-particle systems in many areas of physics, chemistry, and astrophysics.The huge computational requirements for simulations of large systems, especially with long-range forces, demand the use of massively parallel computers.Designing efficient algorithms for these problems is a highly non-trivial task.
Computer Engineering/General Computer Engineering Digital Integrated Circuit Design  

خرید کتاب لاتین

9/30/1999 PREFACE The impact of digital integrated circuits on our modem society has been pervasive.Without them, the current computer and information-technology revolution would not exist.Digital integrated circuits represent the most important enabling technology in this revolution.This is largely true because of the immense amount of signal and computer processing that can be realized in a single integrated circuit; modem integrated circuits may contain millions of logic gates.
Computer Engineering/General Computer Engineering SOME NEW DIRECTIONS IN SCIENCE ON COMPUTERS   9/16/1997 Computers are used in today’s technological world as a powerful tool to simulate many complex phenomena in various fields.This book is an introduction to some of these exciting developments.All the articles are written by experts in their respective fields.Each article teaches by example and the book contains case studies in fields as diverse as physics, biology, fluid dynamics, astrophysics, device modeling and weather simulation.
Computer Engineering/General Computer Engineering SEMICONDUCTOR SUPERLATTICES: GROWTH AND ELECTRONIC PROPERTIES   4/17/1995 This book surveys semiconductor superlattices, in particular their growth and electronic properties in an applied electric field perpendicular to the layers.The main developments in this field, which were achieved in the last five to seven years, are summarized.The electronic properties include transport through minibands at low electric field strengths, the Wannier–Stark localization and Bloch oscillations at intermediate electric field strengths, resonant tunneling of electrons and holes between different subbands, and the formation of electric field domains for large carrier densities at high electric field strengths.
Computer Engineering/General Computer Engineering SELECTED TOPICS ON THE GENERAL PROPERTIES OF QUANTUM FIELD THEORY: LECTURE NOTES   11/30/1993 This book provides a readable account of the foundations of QFT, in particular of the Euclidean formulation with emphasis on the interplay between physical requirements and mathematical structures.The general structures underlying the conventional local (renormalizable) formulation of gauge QFT are discussed also on the basis of simple models.The mechanism of confinement, non-trivial topology and θ-vacua, chiral symmetry breaking and solution of the U(1) problem are clarified through a careful analysis of the Schwinger model, which settles unclear or debated points.
Computer Engineering/General Computer Engineering SEMICONDUCTOR QUANTUM DOTS

خرید کتاب اورجینال

5/28/1993 Semiconductor Quantum Dots presents an overview of the background and recent developments in the rapidly growing field of ultrasmall semiconductor microcrystallites, in which the carrier confinement is sufficiently strong to allow only quantized states of the electrons and holes.The main emphasis of this book is the theoretical analysis of the confinement induced modifications of the optical and electronic properties of quantum dots in comparison with extended materials.

دانلود کتاب مقاله استاندارد | پسورد سایت های علمی

برای سفارش موارد زیر، با تلگرام و یا ایمیل ما مکاتبه کنید. دانلود مقاله ، خرید ایبوک ، دانلود استاندارد ، دریافت پایان نامه و خرید پسورد دانشگاهی خرید کتابهای آمازون، خرید اکانت iThenticate

مقاله های مشابه

دیدگاهتان را بنویسید

نشانی ایمیل شما منتشر نخواهد شد. بخش‌های موردنیاز علامت‌گذاری شده‌اند *

دکمه بازگشت به بالا