eBooks-it.org Logo
eBooks-IT.org Inner Image

Prentice Hall eBooks Page 15

Download free Prentice Hall eBooks Page 15

Engineering Problem Solving with C

Engineering Problem Solving with C Image
4th Edition
In Engineering Problem Solving with C, 4e, best-selling author, Delores Etter, uses real-world engineering and scientific examples and problems throughout the text. Solutions to the problems are developed using the language C and the author's signature five-step problem solving process. Since learning any new skill requires practice at a number of different levels of difficulty, four types of exercises are presented to develop problem-solving skills - Practice! problems, Modify! problems, Short-Answer problems, and Programming problems. The author's clear and precise style creates a highly accessible and readable text for students of all levels....

C++11 for Programmers

C++11 for Programmers Image
2nd Edition
In C++11 for Programmers , the Deitels bring their proven Live Code approach to teaching today's powerful new version of the C++ language. Like all Deitel Developer titles, they teach the best way possible: via hundreds of complete example C++ programs, with thousands of lines of downloadable C++ source code. Unlike other C++11 books, this guide teaches robust, best-practice coding practices that fully support the CERT Coordination Center's authoritative secure coding standards. To help you write programs that are even more secure, the Deitels also introduce C++11's new non-deterministic random-number generation capabilities. Using all these techniqu...

Network Forensics

Tracking Hackers through Cyberspace
Network Forensics Image
'This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.' Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research. On the Internet, every action leaves a markin routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind. Throughout the text, step-by-step case studies guide you through the analysis of network...

Digital Communications

Fundamentals and Applications
Digital Communications Image
2nd Edition
The clear, easy-to-understand introduction to digital communications Completely updated coverage of today's most critical technologies Step-by-step implementation coverage Trellis-coded modulation, fading channels, Reed-Solomon codes, encryption, and more Exclusive coverage of maximizing performance with advanced "turbo codes" "This is a remarkably comprehensive treatment of the field, covering in considerable detail modulation, coding (both source and channel), encryption, multiple access and spread spectrum. It can serve both as an excellent introduction for the graduate student with some background in probability theory or as a valu...

Bluetooth Low Energy

The Developer's Handbook
Bluetooth Low Energy Image
The First Complete Guide to Bluetooth Low Energy: How It Works, What It Can Do, and How to Apply It A radical departure from conventional Bluetooth technology, Bluetooth low energy (BLE) enables breakthrough wireless applications in industries ranging from healthcare to transportation. Running on a coin-sized battery, BLE can operate reliably for years, connecting and extending everything from personal area network devices to next-generation sensors. Now, one of the standard's leading developers has written the first comprehensive, accessible introduction to BLE for every system developer, designer, and engineer. Robin Heydon, a member of the Bluetooth SIG Hall of Fame, has brought together essential information previously scattered through multip...



2007 - 2017 © eBooks-IT.org