Home | Amazing | Today | Tags | Publishers | Years | Search 
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
So You Wanna Be an Embedded Engineer: The Guide to Embedded Engineering, From Consultancy to the Corporate Ladder
Embark on a career in embedded engineering; this practical guide will show you how to succeed!

In this new, highly practical guide, expert embedded designer and manager Lewin Edwards answers the question, "How do I become an embedded engineer?" Embedded professionals agree that there is a treacherous gap between
...
Embedded Software: The Works
Embedded Software: The Works
"This one book has an amazing breadth of coverage, undertaking all the key subjects embedded engineers need to understand in order to succeed." - eg3.com, November 2005

Embedded software needs have grown exponentially over the past quarter century. In 1975 writing 10,000 lines of assembly code was a considered a
...
Switchmode RF Power Amplifiers (Communications Engineering)
Switchmode RF Power Amplifiers (Communications Engineering)
A majority of people now have a digital mobile device whether it be a cell phone, laptop, or blackberry. Now that we have the mobility we want it to be more versatile and dependable; RF power amplifiers accomplish just that. These amplifiers take a small input and make it stronger and larger creating a wider area of use with a more robust...
Integral Mechanical Attachment: A Resurgence of the Oldest Method of Joining
Integral Mechanical Attachment: A Resurgence of the Oldest Method of Joining
First reference of its kind to address one of the most fundamental of all methods for joining separate manufactured components: built-in (integral) mechanical fasteners.

Integral Mechanical Attachment, highlights on one of the world's oldest technologies and makes it new again. Think of buttons and toggles updated to innovative
...
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series)
Wi-Fi Telephony: Challenges and Solutions for Voice over WLANs (Communications Engineering Series)
Wi-Fi telephony is the latest, most cost effective, and clearest way of carrying voice data wirelessly. The great news is that it can be integrated seamlessly into the same infrastructures as currently used for computer and telephone data.The digital quality is far above current cellular technologies.

This book will be among the first to
...
Reservoir Engineering Handbook, Third Edition
Reservoir Engineering Handbook, Third Edition
Reservoir Engineering, Third Edition provides solid information and insight for engineers and students alike on maximizing production from a field in order to obtain the best possible economic return. This guide contains information on predicting oil reservoir performance through the analysis of oil recovery mechanisms and performance calculations....
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Optimizing and Testing WLANs
Optimizing and Testing WLANs
As WLANs (Wireless Local Area Networks) become increasingly common, its becoming vital to be able to test them for proper performance and to optimize their operation. This book, written by a member of the IEEE committee that develops WLAN standards, is the first book addressing that need. It covers test equipment and methods for the RF (wireless)...
Securing  Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)
Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets (Information Security)

Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.

Nearly all books that address the topic of trade secrets have
...

Interfacing PIC Microcontrollers: Embedded Design by Interactive Simulation
Interfacing PIC Microcontrollers: Embedded Design by Interactive Simulation
Explore in detail microcontroller interfacing techniques using the popular PIC 16F877
Work through step-by-step examples interactively using circuit simulation software, supplied as assembly source code
Gain the knowledge of a wide range of peripheral devices such as keyboards, displays, sensors and drives and serial communication with
...
Light and Heavy Vehicle Technology, Fourth Edition
Light and Heavy Vehicle Technology, Fourth Edition
This best-selling book provides the reader with a complete text and reference to the design, construction and operation of the many and varied components of modern motor vehicles, equipping them with the knowledge they need to deal with their servicing and repair. Covering both cars and heavier vehicles and featuring over 1000 illustrations, this...
Result Page: Previous 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy