PDF about computer hardware: 11 to 20 of 1000 results fetched - page 2 [ec]

Computer Methods

Computer Methods

www.ebooks.com/cj.asp?IID=631960&cjsku=631960...
The combination of faster, more advanced computers and more quantitatively oriented biomedical researchers has recently yielded new and more precise methods for the analysis of biomedical data. These better analyses have enhanced the conclusions that can be drawn from biomedical data, and they have changed the way that experiments are designed and performed. This volume, along with previous and forthcoming Computer Methods volumes for the Methods in Enzymology serial, aims to inform biomedical researchers about recent applications of modern data analysis and simulation methods as applied to biomedical research. * Presents step-by-step computer methods and discusses the techniques in detail to enable their implementation in solving a wide range of problems * Informs biomedical researchers of the modern data analysis methods that have developed alongside computer hardware *Presents methods at the "nuts and bolts" level to identify and resolve a problem and analyze what the results mean
Category: Computers. ISBN: 9780123750235
Computer Methods

Computer Methods

www.ebooks.com/cj.asp?IID=635395&cjsku=635395...
The combination of faster, more advanced computers and more quantitatively oriented biomedical researchers has recently yielded new and more precise methods for the analysis of biomedical data. These better analyses have enhanced the conclusions that can be drawn from biomedical data, and they have changed the way that experiments are designed and performed. This volume, along with the 2 previous Computer Methods volumes for the Methods in Enzymology serial, aims to inform biomedical researchers about recent applications of modern data analysis and simulation methods as applied to biomedical research. * Presents step-by-step computer methods and discusses the techniques in detail to enable their implementation in solving a wide range of problems * Informs biomedical researchers of the modern data analysis methods that have developed alongside computer hardware *Presents methods at the "nuts and bolts" level to identify and resolve a problem and analyze what the results mean
Category: Computers. ISBN: 9780123812704
Computer Programming and Computer Systems

Computer Programming and Computer Systems

www.ebooks.com/cj.asp?IID=1876987&cjsku=1876987...
Computer Programming and Computer Systems imparts a reading knowledge of computer systems. This book describes the aspects of machine-language programming, monitor systems, computer hardware, and advanced programming that every thorough programmer should be acquainted with. This text discusses the automatic electronic digital computers, symbolic language, Reverse Polish Notation, and Fortran into assembly language. The routine for reading blocked tapes, dimension statements in subroutines, general-purpose input routine, and efficient use of memory are also elaborated. This publication is intended as an introduction to modern programming practices for professional programmers, but is also valuable to research workers in science, engineering, academic, and industrial fields who are using computers.
Category: Business. ISBN: 9781483229584
Computer Graphics

Computer Graphics

www.ebooks.com/cj.asp?IID=1438148&cjsku=1438148...
Complete Coverage of the Current Practice of Computer Graphics Computer Graphics: From Pixels to Programmable Graphics Hardware explores all major areas of modern computer graphics, starting from basic mathematics and algorithms and concluding with OpenGL and real-time graphics. It gives students a firm foundation in today's high-performance graphics. Up-to-Date Techniques, Algorithms, and API The book includes mathematical background on vectors and matrices as well as quaternions, splines, curves, and surfaces. It presents geometrical algorithms in 2D and 3D for spatial data structures using large data sets. Although the book is mainly based on OpenGL 3.3, it also covers tessellation in OpenGL 4.0, contains an overview of OpenGL ES 2.0, and discusses the new WebGL, which allows students to use OpenGL with shaders directly in their browser. In addition, the authors describe a variety of special effects, including procedural modeling and texturing, fractals, and non-photorealistic rendering. They also explain the fundamentals of the dominant language (OpenCL) and platform (CUDA) of GPGPUs. Web Resource On the book's CRC Press web page, students can download many ready-to-use examples of C++ code demonstrating various effects. C++ wrappers for basic OpenGL entities, such as textures and programs, are also provided. In-Depth Guidance on a Programmable Graphics Pipeline Requiring only basic knowledge of analytic geometry, linear algebra, and C++, this text guides students through the OpenGL pipeline. Using one consistent example, it leads them step by step from simple rendering to animation to lighting and bumpmapping.
Category: Computers. ISBN: 9781439867303
Computer Security

Computer Security

www.ebooks.com/cj.asp?IID=819182&cjsku=819182...
A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing security systems and what makes them different from one another. Unravels the complex topic of computer security and breaks it down in such a way as to serve as an ideal introduction for beginners in the field of computer security Examines the foundations of computer security and its basic principles Addresses username and password, password protection, single sign-on, and more Discusses operating system integrity, hardware security features, and memory Covers Unix security, Windows security, database security, network security, web security, and software security Packed with in-depth coverage, this resource spares no details when it comes to the critical topic of computer security.
Category: Computers. ISBN: 9780470741153
Computer Animation

Computer Animation

www.ebooks.com/cj.asp?IID=631859&cjsku=631859...
Driven by the demands of research and the entertainment industry, the techniques of animation are pushed to render increasingly complex objects with ever-greater life-like appearance and motion. This rapid progression of knowledge and technique impacts professional developers, as well as students. Developers must maintain their understanding of conceptual foundations, while their animation tools become ever more complex and specialized. The second edition of Rick Parent's Computer Animation is an excellent resource for the designers who must meet this challenge. The first edition established its reputation as the best technically oriented animation text. This new edition focuses on the many recent developments in animation technology, including fluid animation, human figure animation, and soft body animation. The new edition revises and expands coverage of topics such as quaternions, natural phenomenon, facial animation, and inverse kinematics. The book includes up-to-date discussions of Maya scripting and the Maya C++ API, programming on real-time 3D graphics hardware, collision detection, motion capture, and motion capture data processing. New up-to-the-moment coverage of hot topics like real-time 3D graphics, collision detection, fluid and soft-body animation and more! Companion site with animation clips drawn from research & entertainment and code samples Describes the mathematical and algorithmic foundations of animation that provide the animator with a deep understanding and control of technique
Category: Technology. ISBN: 9780125320009
The Architecture of Computer Hardware, Systems Software, and Networking

The Architecture of Computer Hardware, Systems Software, and Networking

www.ebooks.com/cj.asp?IID=2064999&cjsku=2064999...
The Architecture of Computer Hardware and System Software provides the right amount of technical detail needed to succeed in the field. This accessible introduction provides the basic principles of computer system architecture and organization in the context of the current technological landscape. The author provides chapters on the fundamentals of networking as it relates to computer systems as well as all kinds of business systems, from entrepreneurial to small business, networked, distributed, and more. This valuable book provides IT professionals with several real-world case studies that clearly show how the concepts are applied in the field.
Category: Computers. ISBN: 9781118322635
Computer, Network, Software, and Hardware Engineering with Applications

Computer, Network, Software, and Hardware Engineering with Applications

www.ebooks.com/cj.asp?IID=818524&cjsku=818524...
There are many books on computers, networks, and software engineering but none that integrate the three with applications . Integration is important because, increasingly, software dominates the performance, reliability, maintainability, and availability of complex computer and systems. Books on software engineering typically portray software as if it exists in a vacuum with no relationship to the wider system. This is wrong because a system is more than software. It is comprised of people, organizations, processes, hardware, and software. All of these components must be considered in an integrative fashion when designing systems. On the other hand, books on computers and networks do not demonstrate a deep understanding of the intricacies of developing software. In this book you will learn, for example, how to quantitatively analyze the performance, reliability, maintainability, and availability of computers, networks, and software in relation to the total system . Furthermore, you will learn how to evaluate and mitigate the risk of deploying integrated systems. You will learn how to apply many models dealing with the optimization of systems. Numerous quantitative examples are provided to help you understand and interpret model results. This book can be used as a first year graduate course in computer, network, and software engineering; as an on-the-job reference for computer, network, and software engineers; and as a reference for these disciplines.
Category: Computers. ISBN: 9781118037454
Hardware-based Computer Security Techniques to Defeat Hackers

Hardware-based Computer Security Techniques to Defeat Hackers

www.ebooks.com/cj.asp?IID=362133&cjsku=362133...
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices. This book provides a road map of the hardware-based security devices that can defeat—and prevent—attacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers: Cryptography Key generation and distribution The qualities of security solutions Secure co-processors Secure bootstrap loading Secure memory management and trusted execution technology Trusted Platform Module (TPM) Field Programmable Gate Arrays (FPGAs) Hardware-based authentification Biometrics Tokens Location technologies Hardware-Based Computer Security Techniques to Defeat Hackers includes a chapter devoted entirely to showing readers how they can implement the strategies and technologies discussed. Finally, it concludes with two examples of security systems put into practice. The information and critical analysis techniques provided in this user-friendly book are invaluable for a range of professionals, including IT personnel, computer engineers, computer security specialists, electrical engineers, software engineers, and industry analysts.
Category: Computers. ISBN: 9780470193396
Designing Embedded Hardware

Designing Embedded Hardware

www.ebooks.com/cj.asp?IID=540710&cjsku=540710...
Embedded computer systems literally surround us: they're in our cell phones, PDAs, cars, TVs, refrigerators, heating systems, and more. In fact, embedded systems are one of the most rapidly growing segments of the computer industry today.Along with the growing list of devices for which embedded computer systems are appropriate, interest is growing among programmers, hobbyists, and engineers of all types in how to design and build devices of their own. Furthermore, the knowledge offered by this book into the fundamentals of these computer systems can benefit anyone who has to evaluate and apply the systems.The second edition of Designing Embedded Hardware has been updated to include information on the latest generation of processors and microcontrollers, including the new MAXQ processor. If you're new to this and don't know what a MAXQ is, don't worry--the book spells out the basics of embedded design for beginners while providing material useful for advanced systems designers. Designing Embedded Hardware steers a course between those books dedicated to writing code for particular microprocessors, and those that stress the philosophy of embedded system design without providing any practical information. Having designed 40 embedded computer systems of his own, author John Catsoulis brings a wealth of real-world experience to show readers how to design and create entirely new embedded devices and computerized gadgets, as well as how to customize and extend off-the-shelf systems.Loaded with real examples, this book also provides a roadmap to the pitfalls and traps to avoid. Designing Embedded Hardware includes: The theory and practice of embedded systems Understanding schematics and data sheets Powering an embedded system Producing and debugging an embedded system Processors such as the PIC, Atmel AVR, and Motorola 68000-series Digital Signal Processing (DSP) architectures Protocols (SPI and I2C) used to add peripherals RS-232C, RS-422, infrared communication, and USB CAN and Ethernet networking Pulse Width Monitoring and motor control If you want to build your own embedded system, or tweak an existing one, this invaluable book gives you the understanding and practical skills you need.
Category: Computers. ISBN: 9780596007553
Previous1 [2] 3456Next