|
|
|
| | Fuzzing: Brute Force Vulnerability DiscoveryThe concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered... | | Handbook of Semiconductor Manufacturing Technology, Second EditionRetaining the comprehensive and in-depth approach that cemented the bestselling first edition's place as a standard reference in the field, the Handbook of Semiconductor Manufacturing Technology, Second Edition features new and updated material that keeps it at the vanguard of today's most dynamic and rapidly growing field. Iconic experts Robert... |
|
Design Engineering: A Manual for Enhanced CreativityAs with any art, science, or discipline, natural talent is only part of the equation. Consistent success stems from honing your skills, cultivating good techniques, and hard work. Design engineering, a field often considered an intuitive process not amenable to scientific investigation, is no exception. Providing descriptive theory, broad context,... | | Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),... | | |
|
|
Result Page: Previous 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 Next |