Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
Embedded software is present everywhere - from a garage door opener to implanted medical devices to multicore computer systems. This book covers the development and testing of embedded software from many different angles and using different programming languages.
Insecure transportation systems are costing our worldwide mobility-based economy as much as 6 per cent of GDP annually. This title examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk. It covers air, sea, roadway, rail and public transport modes.
Suitable for the practicing or aspiring design consultant, this title brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. It focuses on consulting in security design, not security management.
Presents mathematical background with sufficient rigor for an engineering text, and concentrates on providing practical application examples that can be used to design working systems, without needing to fully understand the math and high-level theory operating behind the scenes.
A companion to "Analog Circuit Design: Art, Science, and Personalities", this volume presents viewpoints on subjects related to analog circuit design. It includes visualizing operation of analog circuits. It also describes troubleshooting for optimum circuit performance, and demonstrates how to produce a saleable product.
Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. This title provides basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures.
By covering the essential tips and techniques for investigators, this work includes anecdotes, case studies, and documented procedures. It is intended for those interested in investigations, and also for the readers in and out of the law enforcement field.
Corporate data is important as companies continue to find new ways to use it. This book deals with assessing the quality of corporate data and improving its accuracy using the data profiling method. It explains data profiling and shows how it fits into the larger picture of data quality.
Featuring a section on debug, this work includes coverage of avoiding common hardware, software and interrupt problems. It also contains a section on system integration and debug to address the capabilities of emulators and debuggers, a section about combination microcontroller/PLD devices, and information on industry standard embedded platforms.
Protein Kinase Inhibitors: From Discovery to Therapeutics offers a foundational, pragmatic overview of protein kinases inhibitors and their potential role in disease modulation and treatment. Here, international experts in the field offer an integrated discussion of kinase inhibitor biology, biomarker discovery, and methods for drug design and development. After a brief overview of kinases and kinase inhibitors, subsequent chapters discuss individual kinases that are representative of the wider kinases and kinase families, including their roles in disease pathogenesis, underlying mechanisms, potential inhibitors and their modes of action for therapeutic modulation. Several potential drugs under different stages of clinical trials are discussed, including their relevance to cancer, diabetes, obesity, cardiovascular, neurological, and auto-immune and inflammatory disease, among other disorders. The book also addresses the challenges and opportunities for future kinase inhibitor development.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.