eBooks-it.org Logo
eBooks-IT.org Inner Image

Using eBooks Page 27

Download free Using eBooks Page 27

Code Leader

Using People, Tools, and Processes to Build Successful Software
Code Leader Image
This book is for the career developer who wants to take his or her skill set and/or project to the next level. If you are a professional software developer with 34 years of experience looking to bring a higher level of discipline to your project, or to learn the skills that will help you transition from software engineer to technical lead, then this book is for you. The topics covered in this book will help you focus on delivering software at a higher quality and lower cost. The book is about practical techniques and practices that will help you and your team realize those goals.This book is for the developer understands that the business of software is, first and foremost, business. Writing code is fun, but writing high-quality code on time and at t...

RTL Hardware Design Using VHDL

Coding for Efficiency, Portability, and Scalability
RTL Hardware Design Using VHDL Image
The skills and guidance needed to master RTL hardware designThis book teaches readers how to systematically design efficient, portable, and scalable Register Transfer Level (RTL) digital circuits using the VHDL hardware description language and synthesis software. Focusing on the module-level design, which is composed of functional units, routing circuit, and storage, the book illustrates the relationship between the VHDL constructs and the underlying hardware components, and shows how to develop codes that faithfully reflect the module-level design and can be synthesized into efficient gate-level implementation.Several unique features distinguish the book:* Coding style that shows a clear relationship between VHDL constructs and hardware components*...

Internet Communications Using SIP

Delivering VoIP and Multimedia Services with Session Initiation Protocol
Internet Communications Using SIP Image
2nd Edition
"This book is like a good tour guide.It doesn't just describe the major attractions; you share in the history, spirit, language, and culture of the place."--Henning Schulzrinne, Professor, Columbia UniversitySince its birth in 1996, Session Initiation Protocol (SIP) has grown up. As a richer, much more robust technology, SIP today is fully capable of supporting the communication systems that power our twenty-first century work and life.This second edition handbook has been revamped to cover the newest standards, services, and products. You'll find the latest on SIP usage beyond VoIP, including Presence, instant messaging (IM), mobility, and e...

Digital Signal Processing

Laboratory Experiments Using C and the TMS320C31 DSK
Digital Signal Processing Image
A practical guide to using the TMS320C31 DSP Starter KitWith applications and demand for high-performing digital signal processors expanding rapidly, it is becoming increasingly important for today's students and practicing engineers to master real-time digital signal processing (DSP) techniques.Digital Signal Processing: Laboratory Experiments Using C and the TMS320C31 DSK offers users a practical--and economicalm--approach to understanding DSP principles, designs, and applications. Demonstrating Texas Instruments' (TI) state-of-the-art, low-priced DSP Starter Kit (DSK), this book clearly illustrates and integrates practical aspects of real-time DSP implementation techniques and complex DSP concepts into lab exercises and experiments. TI's TMS320C31...

Hack the Stack

Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
Hack the Stack Image
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and w...



2007 - 2017 © eBooks-IT.org