IT eBooks
Download, Read, Use
FPGA Prototyping by SystemVerilog Examples
FPGA Prototyping by SystemVerilog Examples

This is the successor edition of the popular FPGA Prototyping by Verilog Examples text. It follows the same "learning-by-doing" approach to teach the fundamentals and practices of HDL synthesis and FPGA prototyping. The new edition uses a coherent series of examples to demonstrate the process to develop sophisticated digital circuits and IP (intellectual property) cores, integrate them into an SoC (system on a chip) framework, realize the system on an FPGA prototyping board, and verify the hardware and software operation. The examples start with simple gate-level circuits, progress gradually through the RT (register transfer) level modules, and lead to a functional embedded system with custom I/O peripherals and hardware accelerators. Although it is an introductory text, the examples are developed in a rigorous manner, and the derivations follow the strict design guidelines and coding practices used for large, complex digital systems. The book is completely updated and uses the Syst ...
Computing the Environment
Computing the Environment

Computing the Environment presents practical workflows and guidance for designers to get feedback on their design using digital design tools on environmental performance. Starting with an extensive state-of-the-art survey of what top international offices are currently using in their design projects, this book presents detailed descriptions of the tools, algorithms, and workflows used and discusses the theories that underlie these methods. Project examples from Transsolar Klimaengineering, Buro Happold's SMART Group, Behnish Behnisch Architects, Thomas Herzog, Autodesk Research are contextualized with quotes and references to key thinkers in this field such as Eric Winsberg, Andrew Marsh, Michelle Addington and Ali Malkawi. ...
Learning Malware Analysis
Learning Malware Analysis

Malware analysis and memory forensics are powerful analysis and investigation techniques used in reverse engineering, digital forensics, and incident response. With adversaries becoming sophisticated and carrying out advanced malware attacks on critical infrastructures, data centers, and private and public organizations, detecting, responding to, and investigating such intrusions is critical to information security professionals. Malware analysis and memory forensics have become must-have skills to fight advanced malware, targeted attacks, and security breaches. This book teaches you the concepts, techniques, and tools to understand the behavior and characteristics of malware through malware analysis. It also teaches you techniques to investigate and hunt malware using memory forensics. This book introduces you to the basics of malware analysis, and then gradually progresses into the more advanced concepts of code analysis and memory forensics. It uses real-world malware samples, ...
AWS Lambda Quick Start Guide
AWS Lambda Quick Start Guide

AWS Lambda is a part of AWS that lets you run your code without provisioning or managing servers. This enables you to deploy applications and backend services that operate with no upfront cost. This book gets you up to speed on how to build scalable systems and deploy serverless applications with AWS Lambda. The book starts with the fundamental concepts of AWS Lambda, and then teaches you how to combine your applications with other AWS services, such as AmazonAPI Gateway and DynamoDB. This book will also give a quick walk through on how to use the Serverless Framework to build larger applications that can structure code or autogenerate boilerplate code that can be used to get started quickly for increased productivity. Toward the end of the book, you will learn how to write, run, and test Lambda functions using Node.js, Java, Python, and C#. ...
Building Dashboards with Microsoft Dynamics GP 2013 and Excel 2013
Building Dashboards with Microsoft Dynamics GP 2013 and Excel 2013

Accounting systems like Microsoft Dynamics GP 2013 hold a wealth of information. Excel 2013 provides a great tool for linking to, extracting, analysing, and presenting that rich data to help companies make better, faster, and smarter decisions. Building Dashboards with Microsoft Dynamics GP 2013 and Excel 2013 covers how to get the rich, detailed information contained in Microsoft Dynamics GP 2013 and present it in an attractive, easy-to-understand way using Excel 2013. The book shows in detail how to build great-looking dashboards that enhance a company's decision-making process. ...
Hands-On Cybersecurity with Blockchain
Hands-On Cybersecurity with Blockchain

Blockchain technology is being welcomed as one of the most revolutionary and impactful innovations of today. Blockchain technology was first identified in the world's most popular digital currency, Bitcoin, but has now changed the outlook of several organizations and empowered them to use it even for storage and transfer of value. This book will start by introducing you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS. The next set of chapters will help you to understand the workings of Blockchain technology, Ethereum and Hyperledger architecture and how they fit into the cybersecurity ecosystem. These chapters will also help you to write your first distributed application on Ethereum Blockchain and the Hyperledger Fabric framework. Later, you will learn about the security triad and its adaptation with Blockchain. The last set of chapters will take you through the core concepts of cybersecurity, such as DDoS protection, PKI- ...
Big Data Architect's Handbook
Big Data Architect's Handbook

The big data architects are the “masters” of data, and hold high value in today's market. Handling big data, be it of good or bad quality, is not an easy task. The prime job for any big data architect is to build an end-to-end big data solution that integrates data from different sources and analyzes it to find useful, hidden insights. Big Data Architect's Handbook takes you through developing a complete, end-to-end big data pipeline, which will lay the foundation for you and provide the necessary knowledge required to be an architect in big data. Right from understanding the design considerations to implementing a solid, efficient, and scalable data pipeline, this book walks you through all the essential aspects of big data. It also gives you an overview of how you can leverage the power of various big data tools such as Apache Hadoop and ElasticSearch in order to bring them together and build an efficient big data solution. By the end of this book, you will be able to build ...
Hands-On Concurrency with Rust
Hands-On Concurrency with Rust

Most programming languages can really complicate things, especially with regard to unsafe memory access. The burden on you, the programmer, lies across two domains: understanding the modern machine and your language's pain-points. This book will teach you to how to manage program performance on modern machines and build fast, memory-safe, and concurrent software in Rust. It starts with the fundamentals of Rust and discusses machine architecture concepts. You will be taken through ways to measure and improve the performance of Rust code systematically and how to write collections with confidence. You will learn about the Sync and Send traits applied to threads, and coordinate thread execution with locks, atomic primitives, data-parallelism, and more. The book will show you how to efficiently embed Rust in C++ code and explore the functionalities of various crates for multithreaded applications. It explores implementations in depth. You will know how a mutex works and build several yo ...
Beginning Backup and Restore for SQL Server
Beginning Backup and Restore for SQL Server

Be guided through the techniques to back up and restore databases and files in SQL Server. Multiple techniques are presented for ensuring the integrity and consistency of database backups, as well as the reliability and manageability of restoring from backups. In today's data-driven world, the most important asset that a company has is its data. Data recovery strategies can be wide ranging; from the practically non-existent backup without verification to a very complex, distributed, and redundant system. An important objective for any database administrator is data loss prevention, and in a catastrophic data loss event, pre-defined data recovery techniques must be employed in order to get the databases back up and running efficiently and quickly. Using a tutorial method of teaching, Beginning Backup and Restore for SQL Server explores the many facets behind the principles of backing up and restoring data from your database, and then shows practical application methods for gettin ...
Design Patterns in C#
Design Patterns in C#

Get hands-on experience with each Gang of Four design pattern using C#. For each of the patterns, you'll see at least one real-world scenario, a coding example, and a complete implementation including output. In the first part of Design Patterns in C#, you will cover the 23 Gang of Four (GoF) design patterns, before moving onto some alternative design patterns, including the Simple Factory Pattern, the Null Object Pattern, and the MVC Pattern. The final part winds up with a conclusion and criticisms of design patterns with chapters on anti-patterns and memory leaks. By working through easy-to-follow examples, you will understand the concepts in depth and have a collection of programs to port over to your own projects. Along the way, the author discusses the different creational, structural, and behavioral patterns and why such classifications are useful. In each of these chapters, there is a Q&A session that clears up any doubts and covers the pros and cons of each of these patte ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2026