![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issues in all types of electronic devices and systems such as ASICs, COTS, FPGAs, microprocessors/DSPs, and embedded systems. This serves as an invaluable reference to the state-of-the-art research that is of critical significance to the security of, and trust in, modern society's microelectronic-supported infrastructures.
This book provides a comprehensive overview of key technologies being used to address challenges raised by continued device scaling and the extending gap between memory and central processing unit performance. Authors discuss in detail what are known commonly as "More than Moore" (MtM), technologies, which add value to devices by incorporating functionalities that do not necessarily scale according to "Moore's Law". Coverage focuses on three key technologies needed for efficient power management and cost per performance: novel memories, 3D integration and photonic on-chip interconnect.
The easy way to get up and running with Windows 10! With Windows 10 For Seniors For Dummies, becoming familiarized with Windows 10 is a painless process. If you're interested in learning the basics of this operating system without having to dig through confusing computer jargon, look no further. This book offers a step-by-step approach that is specifically designed to assist first time Windows 10 users who are over-50, providing easy-to-understand language, large-print text, and an abundance of helpful images along the way! Protect your computer Follow friends and family online Use Windows 10 to play games and enjoy media Check your security and maintenance status Step-by-step instructions are provided to ensure that you don't get lost at any point along the way.
This book is the fifth volume of the CoreGRID series. Organized jointly with the Euro-Par 2007 conference, The CoreGRID Symposium intends to become the premiere European event on Grid Computing. The aim of this symposium is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer Computing. The book includes all aspects of Grid Computing including service infrastructure. It is designed for a professional audience composed of researchers and practitioners in industry. This volume is also suitable for advanced-level students in computer science.
Efficient design of embedded processors plays a critical role in
embedded systems design. Processor description languages and their
associated specification, exploration and rapid prototyping
methodologies are used to find the best possible design for a given
set of applications under various design constraints, such as area,
power and performance.
This exam is designed to validate Windows Server 2003 Microsoft
Certified Systems Administrators (MCSEs) AD, Network
Infrastructure, and Application Platform Technical Specialists
skills. The object of this exam is to validate only the skills that
are are different from the existing MCSE skills. This exam will
fulfill the Windows Server 2008 Technology Specialist requirements
of Exams 70-640, 70-642, and 70-643.
This exam is designed to validate Windows Server 2003 Microsoft
Certified Systems Administrators (MCSAs) AD and Application
Platform Technical Specialists skills. The object of this exam is
to validate only the skills that are are different from the
existing MCSA skills. This exam will fulfill the Windows Server
2008 Technology Specialist requirements of Exams 70-640 and 70-643.
Interactive products designed for children-whether toys, games,
educational products, or websites-are increasingly embedded in
children's lives and school experiences. Making these products
safe, effective, and entertaining requires new methodologies for
carrying out sound and unbiased evaluations for these users with
unique requirements, environments, and ethical considerations.
Modern multimedia systems are becoming increasingly multiprocessor and heterogeneous to match the high performance and low power demands placed on them by the large number of applications. The concurrent execution of these applications causes interference and unpredictability in the performance of these systems. In Multimedia Multiprocessor Systems, an analysis mechanism is presented to accurately predict the performance of multiple applications executing concurrently. With high consumer demand the time-to-market has become significantly lower. To cope with the complexity in designing such systems, an automated design-flow is needed that can generate systems from a high-level architectural description such that they are not error-prone and consume less time. Such a design methodology is presented for multiple use-cases -- combinations of active applications. A resource manager is also presented to manage the various resources in the system, and to achieve the goals of performance prediction, admission control and budget enforcement.
Dynamically Reconfigurable Systems is the first ever to focus on the emerging field of Dynamically Reconfigurable Computing Systems. While programmable logic and design-time configurability are well elaborated and covered by various texts, this book presents a unique overview over the state of the art and recent results for dynamic and run-time reconfigurable computing systems. Reconfigurable hardware is not only of utmost importance for large manufacturers and vendors of microelectronic devices and systems, but also a very attractive technology for smaller and medium-sized companies. Hence, Dynamically Reconfigurable Systems also addresses researchers and engineers actively working in the field and provides them with information on the newest developments and trends in dynamic and run-time reconfigurable systems.
Check Point NGX R65 is the next major release of Check Point's
flagship firewall software product, which has over 750,000
registered users. Check Point's NGX is the underlying security
software platform for all of the company's enterprise firewall, VPN
and management solutions. It enables enterprises of all sizes to
reduce the cost and complexity of security management and ensure
that their security systems can be easily extended to adapt to new
and emerging threats. This title is a continuation of Syngress'
best-selling references on Check Point's market leading Firewall
and VPN products.
Each day, new applications and methods are developed for utilizing technology in the field of medical sciences, both as diagnostic tools and as methods for patients to access their medical information through their personal gadgets. However, the maximum potential for the application of new technologies within the medical field has not yet been realized. Mobile Devices and Smart Gadgets in Medical Sciences is a pivotal reference source that explores different mobile applications, tools, software, and smart gadgets and their applications within the field of healthcare. Covering a wide range of topics such as artificial intelligence, telemedicine, and oncology, this book is ideally designed for medical practitioners, mobile application developers, technology developers, software experts, computer engineers, programmers, ICT innovators, policymakers, researchers, academicians, and students.
This book provides a comprehensive description of the architetural
techniques to tackle the soft error problem. It covers the new
methodologies for quantitative analysis of soft errors as well as
novel, cost-effective architectural techniques to mitigate them. To
provide readers with a better grasp of the broader problem
deffinition and solution space, this book also delves into the
physics of soft errors and reviews current circuit and software
mitigation techniques.
Fundamental Problems in Computing is in honor of Professor Daniel J. Rosenkrantz, a distinguished researcher in Computer Science. Professor Rosenkrantz has made seminal contributions to many subareas of Computer Science including formal languages and compilers, automata theory, algorithms, database systems, very large scale integrated systems, fault-tolerant computing and discrete dynamical systems. For many years, Professor Rosenkrantz served as the Editor-in-Chief of the Journal of the Association for Computing Machinery (JACM), a very prestigious archival journal in Computer Science. His contributions to Computer Science have earned him many awards including the Fellowship from ACM and the ACM SIGMOD Contributions Award.
This book provides an overview of automatic test pattern generation (ATPG) and introduces novel techniques to complement classical ATPG, based on Boolean Satisfiability (SAT). A fast and highly fault efficient SAT-based ATPG framework is presented which is also able to generate high-quality delay tests such as robust path delay tests, as well as tests with long propagation paths to detect small delay defects. The aim of the techniques and methodologies presented in this book is to improve SAT-based ATPG, in order to make it applicable in industrial practice. Readers will learn to improve the performance and robustness of the overall test generation process, so that the ATPG algorithm reliably will generate test patterns for most targeted faults in acceptable run time to meet the high fault coverage demands of industry. The techniques and improvements presented in this book provide the following advantages: Provides a comprehensive introduction to test generation and Boolean Satisfiability (SAT);Describes a highly fault efficient SAT-based ATPG framework; Introduces circuit-oriented SAT solving techniques, which make use of structural information and are able to accelerate the search process significantly;Provides SAT formulations for the prevalent delay faults models, in addition to the classical stuck-at fault model;Includes an industrial perspective on the state-of-the-art in the testing, along with SAT; two topics typically distinguished from each other. "
Cryptographic applications, such as RSA algorithm, ElGamal cryptography, elliptic curve cryptography, Rabin cryptosystem, Diffie -Hellmann key exchange algorithm, and the Digital Signature Standard, use modular exponentiation extensively. The performance of all these applications strongly depends on the efficient implementation of modular exponentiation and modular multiplication. Since 1984, when Montgomery first introduced a method to evaluate modular multiplications, many algorithmic modifications have been done for improving the efficiency of modular multiplication, but very less work has been done on the modular exponentiation to improve the efficiency. This research monograph addresses the question- how can the performance of modular exponentiation, which is the crucial operation of many public-key cryptographic techniques, be improved? The book focuses on Energy Efficient Modular Exponentiations for Cryptographic hardware. Spread across five chapters, this well-researched text focuses in detail on the Bit Forwarding Techniques and the corresponding hardware realizations. Readers will also discover advanced performance improvement techniques based on high radix multiplication and Cryptographic hardware based on multi-core architectures.
SystemVerilog is a rich set of extensions to the IEEE 1364-2001 Verilog Hardware Description Language (Verilog HDL). These extensions address two major aspects of HDL-based design. First, modeling very large designs with concise, accurate, and intuitive code. Second, writing high-level test programs to efficiently and effectively verify these large designs. The first edition of this book addressed the first aspect of the SystemVerilog extensions to Verilog. Important modeling features were presented, such as two-state data types, enumerated types, user-degined types, structures, unions, and interfaces. Emphasis was placed on the proper usage of these enhancements for simulation and synthesis.
Does IT spending really boost bank performance? It is widely accepted that technological developments have had a major impact on reshaping both front- and back-office operations, but there still remains some doubt as to whether the massive spending on IT by banks has improved performance or productivity in this sector. Elena Beccalli provides a useful insight into the effects of IT investments on European bank performance, drawing on new empirical evidence that academics, bankers, and IT consultants alike will find to be a fascinating contribution to this ongoing strategic debate.
This volume gives the latest developments in on the mechanisms of cancer cell resistance to apoptotic stimuli, which eventually result in cancer progression and metastasis. One of the main challenges in cancer research is to develop new therapies to combat resistant tumors. The development of new effective therapies will be dependent on delineating the biochemical, molecular, and genetic mechanisms that regulate tumor cell resistance to cytotoxic drug-induced apoptosis. These mechanisms should reveal gene products that directly regulate resistance in order to develop new drugs that target these resistance factors and such new drugs may either be selective or common to various cancers. If successful, new drugs may not be toxic and may be used effectively in combination with subtoxic conventional drugs to achieve synergy and to reverse tumor cell resistance. The research developments presented in this book can be translated to produce better clinical responses to resistant tumors.
Exchange, SQL and IIS are at the core of most Microsoft enterprise
servers. The 2007 releases of these products, along with the
release of Windows Vista and Windows 2008 Server, represents the
biggest overhaul of Windows enterprise products since Windows 2000.
The dramatic changes to security tools and the addition of features
that support "anywhere access" present IT professionals with a
steep learning curve. Making certain that these products are
configured to meet regulatory compliance requirements adds
addtionaly complexity to day-to-day management network management.
The main characteristic of Reconfigurable Computing is the presence
of hardware that can be reconfigured to implement specific
functionality more suitable for specially tailored hardware than on
a simple uniprocessor. Reconfigurable computing systems join
microprocessors and programmable hardware in order to take
advantage of the combined strengths of hardware and software and
have been used in applications ranging from embedded systems to
high performance computing. Many of the fundamental theories have
been identified and used by the Hardware/Software Co-Design
research field. Although the same background ideas are shared in
both areas, they have different goals and use different
approaches.This book is intended as an introduction to the entire
range of issues important to reconfigurable computing, using FPGAs
as the context, or "computing vehicles" to implement this powerful
technology. It will take a reader with a background in the basics
of digital design and software programming and provide them with
the knowledge needed to be an effective designer or researcher in
this rapidly evolving field.
WE ARE ADRIFT IN A SEA OF INFORMATION. We need information to make
good decisions, to get things done, to learn, and to gain better
mastery of the world around us. But we do not always have good
control of our information - not even in the "home waters" of an
office or on the hard drive of a computer. Instead, information may
be controlling us - keeping us from doing the things we need to do,
getting us to waste money and precious time. The growth of
available information, plus the technologies for its creation,
storage, retrieval, distribution and use, is astonishing and
sometimes bewildering. Can there be a similar growth in our
understanding for how best to manage information and informational
tools?
This book provides an invaluable primer on the techniques utilized in the design of low power digital semiconductor devices. Readers will benefit from the hands-on approach which starts form the ground-up, explaining with basic examples what power is, how it is measured and how it impacts on the design process of application-specific integrated circuits (ASICs). The authors use both the Unified Power Format (UPF) and Common Power Format (CPF) to describe in detail the power intent for an ASIC and then guide readers through a variety of architectural and implementation techniques that will help meet the power intent. From analyzing system power consumption, to techniques that can be employed in a low power design, to a detailed description of two alternate standards for capturing the power directives at various phases of the design, this book is filled with information that will give ASIC designers a competitive edge in low-power design.
Prepare for Microsoft Exam AZ-204-and help demonstrate your real-world mastery of Microsoft Azure solution development. Designed for working Azure developers, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Solutions Associate level. Focus on the expertise measured by these objectives: * Develop Azure compute solutions * Develop for Azure storage * Implement Azure security * Monitor, troubleshoot, and optimize Azure solutions * Connect to and consume Azure services and third-party services This Microsoft Exam Ref: * Organizes its coverage by exam objectives * Features strategic, what-if scenarios to challenge you * Assumes you want to show your ability to design and build diverse Microsoft Azure cloud solutions, and successfully participate in all phases of their development About the Exam Exam AZ-204 focuses on knowledge needed to implement IaaS solutions; create Azure App Service Web Apps; implement Azure Functions; develop solutions using Cosmos DB and Blob Storage; implement user authentication, authorization, and secure cloud solutions; integrate caching and content delivery within solutions; instrument solutions to support monitoring and logging; develop an App Service Logic App; implement API Management; develop event- and message-based solutions. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Developer Associate credential, demonstrating your readiness to design, build, test, and maintain Microsoft Azure cloud solutions, and partner with other cloud professionals and clients to implement them. This exam is also a prerequisite for the Microsoft Certified: Azure DevOps Engineer Expert credential. See full details at: microsoft.com/learn
With the semiconductor market growth, new Integrated Circuit designs are pushing the limit of the technology and in some cases, require speci?c ?ne-tuning of certain process modules in manufacturing. Thus the communities of design and technology are increasingly intertwined. The issues that require close interactions and colla- ration for trade-off and optimization across the design/device/process ?elds are addressed in this book. It contains a set of outstanding papers, keynote and tutorials presented during 3 days at the International Conference on Integrated Circuit Design and Technology (ICICDT) held in June 2008 in Minatec, Grenoble. The selected papers are spread over ?ve chapters covering various aspects of emerging technologies and devices, advanced circuit design, reliability, variability issues and solutions, advanced memories and analog and mixed signals. All these papers are focusing on design and technology interactions and comply with the scope of the conference. v . Contents Part I Introduction 1 Synergy Between Design and Technology: A Key Factor in the Evolving Microelectronic Landscape. . . . . . . . . . . . . . . . . . . . . . 3 Michel Brilloue]t Part II Emerging Technologies and Circuits 2 New State Variable Opportunities Beyond CMOS: A System Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Victor V. Zhirnov, Ralph K. Cavin, and George I. Bourianoff 3 A Simple Compact Model to Analyze the Impact of Ballistic and Quasi-Ballistic Transport on Ring Oscillator Performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 S. Martinie, D. Munteanu, G. Le Carval, and J. L. Autran Part III Advanced Devices and Circuits 4 Low-Voltage Scaled 6T FinFET SRAM Cells . . . . . . . . . . . . . . . . . . . 55 N. Collaert, K. von Arnim, R. Rooyackers, T." |
![]() ![]() You may like...
The System Designer's Guide to VHDL-AMS…
Peter J Ashenden, Gregory D. Peterson, …
Paperback
R2,421
Discovery Miles 24 210
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,581
Discovery Miles 15 810
|