VBA and Macros : Microsoft Excel 2010
24%
OFF
Available
 
About the Book
Features
  • A new chapter on 8051 C programming.
  • A new section on the 8051 C programming of timers.
  • A new section on the second serial port of the DS89C4x0 chip.
  • A new section on the 8051 C programming of the second serial port.
  • A new section on the 8051 C programming of interrupts.
  • Programming of the 1KB SRAM of the DS89C4x0 chip.
  • A new section on the 8051 C programming of external memory.
  • A new chapter on the DS12887 RTC (real-time clock) chip.
  • A new chapter on motors, relays, and optoisolators
About the Authors
Muhammad Ali Mazidi went to Tabriz University and holds Master’s degrees from both Southern Methodist University and the University of Texas at Dallas. He is currently a.b.d. on his Ph.D. in the Electrical Engineering Department of Southern Methodist University. He is co-author of a widely used textbook, The 80x86 IBM PC and Compatible Computers, also available from Prentice Hall. He teaches microprocessor-based system design at DeVry University in Dallas, Texas. Janice Gillispie Mazidi has a Master of Science degree in Computer Science from the University of North Texas. She has several years of experience as a software engineer in Dallas. She has been chief technical writer and production manager, and was responsible for software development and testing of a widely used textbook, The 80x86 IBM PC and Compatible Computers, also available from Prentice Hall. Rolin McKinlay has a BSEET from DeVry University. He is currently working on his Master’s degree and PE license in the state of Texas. He is currently self-employed as a programmer and circuit board designer, and is a partner in MicroDigitalEd.com. Features
  • Learn to develop embedded systems using the Linux operating system
  • Provides the broadest coverage of topics that a developer needs to understand in order to be successful developing with embedded Linux.
  • Special emphasis placed on the Busybox package, which is rapidly emerging as a popular replacement for traditional Linux utilities in an embedded environment.
Features
  • A wealth of examples and cases used throughout to make the subject relevant to the real world and bring it to life.
  • Learning features are found throughout the text, such as questions, definitions, and summaries, which encourage students to reflect on what they've learnt and highlight the links between different areas of the subject.
  • Suitable for a range of courses: advanced material is covered for more rigorous courses, but is easily identifiable and can be omitted without hindering understanding of basic concepts.
Features

  • Topic coverage includes modeling, diagrams, relational algebra/calculus, SQL, normalization; Advanced object database, mining, XML, and security; Advanced modeling discussions in the areas of active, temporal, and spatial databases; Physical database design and tuning; Current database application areas of GIS, genome, and digital libraries; The relational approach, including modeling, design, algebra and calculus, and query languages; Both traditional ER model and UML in data modeling material.

  • This market-leading text serves as a valued reference for those who will interact with databases in future courses and careers. Renowned for its accessible, comprehensive coverage, it provides a solid introduction to database systems and applications.

  • Extensive coverage includes:
    • Basic topics such as modeling, diagrams, relational algebra/calculus, SQL, normalization.
    • Advanced object database, mining, XML, and security.
    • Advanced modeling discussions in the areas of active, temporal, and spatial databases.
    • Physical database design and tuning.
    • Current database application areas of GIS, genome, and digital libraries.
    • The relational approach, i

      Table of Contents:
      NOTATION
      PREFACE
      Reader's Guide
      Overview
      PART ONE SYMMETRIC CIPHERS
      1. Classical Encryption Techniques
      2. Block Ciphers and the Data Encryption Standard
      3. Basic Concepts in Number Theory and Finite Fields
      4. Advanced Encryption Standard
      5. Block Cipher Operation
      6. Pseudorandom Number Generation and Stream Ciphers
      PART TWO ASYMMETRIC CIPHERS
      1. More Number Theory
      2. Public-Key Cryptography and RSA
      3. Other Public-Key Cryptosystems
      PART THREE CRYPTOGRAPHIC DATA INTEGRITY ALGORITHMS
      1. Cryptographic Hash Functions
      2. Message Authentication Codes
      3. Digital Signatures
      PART FOUR MUTUAL TRUST
      1. Key Management and Distribution
      2. User Authentication Protocols
      PART FIVE NETWORK AND INTERNET SECURITY
      1. Transport-Level Security
      2. Wireless Network Security
      3. Electronic Mail Security
      4. IP Security

      Appendix A Projects for Teaching Cryptography and Network Security
      Appendix B Sage Examples
      Appendix C Sage Problems
Book Details
ISBN-13: 9788131764138
EAN:
Publisher Date: 2011
No of Pages: 656
ISBN-10: 8131764133
Publisher: Pearson
Binding: Paperback