Mostrando 261 - 280 Resultados de 327 Para Buscar 'Programmed Data Processor', tiempo de consulta: 0.13s Limitar resultados
  1. 261
    por Wilson, G. R.
    Publicado 2002
    Tabla de Contenidos: “…6.3 Converting the source code to machine code - manual assembly 6.4 Using the assembler; 6.5 Assembly language; 6.6 Types of instruction; 6.7 Problems; Chapter 7. Program structures; 7.1 Program control structures; 7.2 Data structures; 7.3 Subroutines; 7.4 Problems; Chapter 8. …”
    Libro electrónico
  2. 262
    por Benini, Luca, 1967-
    Publicado 2006
    Tabla de Contenidos: “…3.3 Building Blocks3.4 Summary; 4 The Data-Link Layer in NoC Design; 4.1 Tasks of the Data-Link Layer; 4.2 On-Chip Communication Reliability; 4.3 Fault Models for NoCs; 4.4 Principles of Coding Theory; 4.5 The Power-Reliability Trade-Off; 4.6 Unified Coding Framework; 4.7 Adaptive Error Protection; 4.8 Data-Link Layer Architecture: Case Studies; 4.9 On-Chip Stochastic Communication; 4.10 Link-Level versus End-to-End Error Protection; 4.11 Flow Control; 4.12 Performance Exploration; 4.13 Summary; 5 Network and Transport Layers in Network on Chip; 5.1 Network and Transport Layers in NoCs…”
    Libro electrónico
  3. 263
    por Das, Lyla. B.
    Publicado 2011
    Tabla de Contenidos:
    Libro electrónico
  4. 264
    Publicado 2016
    Libro electrónico
  5. 265
  6. 266
    por Arrell, Kathryn
    Publicado 2005
    Tabla de Contenidos: “…Using Tivoli Storage Manager and Tivoli Data Protect for Oracle Database 10g -- 6.1 IBM Tivoli Storage Manager overview -- 6.2 Tivoli Storage Manager architecture -- 6.3 Tivoli Data Protection for Oracle -- 6.4 RMAN and Tivoli Data Protection for Oracle -- 6.5 Overview of installation process of TSM and TDPO -- 6.5.1 Configuring RMAN -- 6.5.2 Installing TSM server…”
    Libro electrónico
  7. 267
    Publicado 2014
    Tabla de Contenidos: “…Making Yourself Available (Or Not) for ChattingMaking Calls with FaceTime; Chapter 4: Moving Around with Maps; Wherever You Go, There You Are; Asking For Directions; Book III: Beyond the Basics; Chapter 1: Backing Up and Restoring Your Data; Understanding Different Backup Options; Blasting into the Past with Time Machine; Moving Your Backup from an Old Mac to a New Mac; Working with Data-Recovery Programs; Chapter 2: Protecting Your Mac against Local and Remote Threats; Locking Down Your Mac; Using Passwords; Encrypting Data with FileVault; Using Firewalls; Selecting Privacy Settings…”
    Libro electrónico
  8. 268
    Publicado 2024
    Tabla de Contenidos: “…Import/Export -- Privacy -- State Privacy Laws -- Compliance -- Contracting and Procurement -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 5 Protecting Security of Assets -- Identifying and Classifying Information and Assets -- Defining Sensitive Data -- Defining Data Classifications -- Defining Asset Classifications -- Understanding Data States -- Determining Compliance Requirements -- Determining Data Security Controls -- Establishing Information and Asset Handling Requirements -- Data Maintenance -- Data Loss Prevention -- Labeling Sensitive Data and Assets -- Handling Sensitive Information and Assets -- Data Collection Limitation -- Data Location -- Storing Sensitive Data -- Data Destruction -- Ensuring Appropriate Data and Asset Retention -- Data Protection Methods -- Digital Rights Management -- Cloud Access Security Broker -- Pseudonymization -- Tokenization -- Anonymization -- Understanding Data Roles -- Data Owners -- Data Controllers and Processors -- Data Custodians -- Users and Subjects -- Using Security Baselines -- Comparing Tailoring and Scoping -- Standards Selection -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 6 Cryptography and Symmetric Key Algorithms -- Cryptographic Foundations -- Goals of Cryptography -- Cryptography Concepts -- Cryptographic Mathematics -- Ciphers -- Modern Cryptography -- Cryptographic Keys -- Symmetric Key Algorithms -- Asymmetric Key Algorithms -- Hashing Algorithms -- Symmetric Cryptography -- Block Cipher Modes of Operation -- Data Encryption Standard -- Triple DES -- International Data Encryption Algorithm -- Blowfish -- SKIPJACK -- Rivest Ciphers -- Advanced Encryption Standard -- CAST -- Comparison of Symmetric Encryption Algorithms -- Symmetric Key Management -- Cryptographic Life Cycle -- Summary -- Study Essentials -- Written Lab…”
    Libro electrónico
  9. 269
    Publicado 2012
    Tabla de Contenidos: “…Sequential Files -- Direct Files -- Indexed Sequential Files -- Hierarchical Database Model -- Network Database Model -- Relational Database Model -- Distributed Database System -- Object-oriented Database System -- Data Warehousing -- Data Mining -- Characteristics of SQL -- SQL Standards -- CREATE TABLE -- ALTER TABLE -- DROP TABLE -- INSERT -- UPDATE -- DELETE -- SELECT -- Multiple-choice Questions -- Answers -- Chapter 17: Microsoft Office Access 2003 -- Adding and Modifying Records -- Deleting Records -- Running a Query -- Multiple-choice Questions -- Answers -- Chapter 18: E-commerce Fundamentals -- Hardware -- Software -- Internet Protocol (IP) Address -- ISP -- Internet Presence Providers -- Malicious Software -- Unwanted Programs -- Phishing -- Hacking and Cybervandalism -- Credit Card Fraud/Theft -- Spoofing and Sniffing -- DoS and distributed DoS attacks -- Encryption -- Digital Signature -- Digital Certificate -- SSL -- SET -- Working of EDI -- Multiple-choice Questions -- Answers -- Index…”
    Libro electrónico
  10. 270
    por Frenzel, Louis E., 1959-
    Publicado 2010
    Tabla de Contenidos: “…How Microcomputers Work; Introduction; Concepts and Definitions; Computer Organization and Operation; Operational Details; Registers and the ALU; Control Unit; Instruction-Word Formats; Program Execution Example; Microcomputer Buses; Popular Micros; 8- and 16-Bit Microcontrollers; 32- and 64-Bit Processors; A Word about Software; Programming Languages; Digital Signal Processing…”
    Libro electrónico
  11. 271
    Publicado 2003
    Libro electrónico
  12. 272
    Publicado 2017
    “…Some experience with programming will be an advantage. What You Will Learn Measure data from a digital temperature and humidity sensor using the ESP8266 Explore advanced ESP8266 functionalities Control devices from anywhere in the world using MicroPython Troubleshoot issues with cloud data monitoring Tweet data from the Arduino board Build a cloud-connected power-switch with the ESP8266 Create an ESP8266 robot controlled from the cloud In Detail The ESP8266 Wi-Fi Module is a self contained System on Chip (SOC) with an integrated TCP/IP protocol stack and can give any microcontroller access to your Wi-Fi network. …”
    Libro electrónico
  13. 273
    por Patterson, David A.
    Publicado 2014
    Tabla de Contenidos: “…Chapter 6.Enhancing Performance with Pipelining6.1 Introduction; 6.2 A Pipelined Datapath; 6.3 Pipelined Control; 6.4 Data Hazards; 6.5 Control for Data Hazards: Stalls; 6.6 Reducing Data Hazards: Forwarding; 6.7 Branch Hazards; 6.8 Exceptions; 6.9 Performance of Pipelined Systems; 6.10 Fallacies and Pitfalls; 6.11 Concluding Remarks; 6.12 Historical Perspective and Further Reading; 6.13 Exercises; Chapter 7.Large and Fast: Exploiting Memory Hierarchy; 7.1 Introduction; 7.2 Caches; 7.3 Virtual Memory; 7.4 A Common Framework for Memory Hierarchies; 7.5 Fallacies and Pitfalls…”
    Libro electrónico
  14. 274
    Publicado 2017
    Libro electrónico
  15. 275
    Publicado 2017
    Tabla de Contenidos: “…In-Band Versus Out-of-Band Data Collection -- 8.2. Processor Performance Counters -- 8.3. …”
    Libro electrónico
  16. 276
    Publicado 2012
    Tabla de Contenidos: “…Isolating a DSP kernelModeling of true system behaviors; System effects; Execution in a multicore/multidevice environment; Measuring the measurement; Chapter 10 - Optimizing DSP Software - High-level Languages and Programming Models; Assembly language; C Programming language with intrinsics and pragmas; Embedded C; C++ for embedded systems; Auto-vectorizing compiler technology; Chapter 11 - Optimizing DSP Software -Code Optimization; Optimization process; Using the development tools; Background - understanding the DSP architecture; Basic C optimization techniques…”
    Libro electrónico
  17. 277
    Publicado 2022
    Tabla de Contenidos: “…-- The six principles of the GDPR -- Summary -- Chapter 4: Data Processing -- The data controller -- The data processor -- Accountability -- Recommended documents -- The privacy dashboard -- Training materials -- Mandatory documents -- Data protection - the last warning -- EU-US Privacy Shield -- Brief summary -- Schrems II ruling -- The frequently asked questions issued by the EDPB -- What occurs next? …”
    Libro electrónico
  18. 278
    Publicado 2013
    Tabla de Contenidos: “…6.4 Some simple examples of combinatorial logic circuits6.5 Sequential logic; 6.6 Summary; 7 Computers and programs; 7.1 The essential architecture of a computer system; 7.2 A look inside the central processing unit; 7.3 The representation of instructions in a computer; 7.4 The representation of data in a computer; 7.5 The components of programs; 7.6 Conditional branching and the program status word; 7.7 Subroutines and stacks; 7.8 Summary; 8 Interfacing: the use of the computer as a component; 8.1 Interfacing from the point of view of the programmer…”
    Libro electrónico
  19. 279
    por Koren, Israel, 1945-
    Publicado 2007
    Tabla de Contenidos: “…4.2.3 Rectangular Mesh and Interstitial Mesh4.2.4 Hypercube Network; 4.2.5 Cube-Connected Cycles Networks; 4.2.6 Loop Networks; 4.2.7 Ad Hoc Point-to-Point Networks; 4.3 Fault-Tolerant Routing; 4.3.1 Hypercube Fault-Tolerant Routing; 4.3.2 Origin-Based Routing in the Mesh; 4.4 Further Reading; 4.5 Exercises; References; 5 Software Fault Tolerance; 5.1 Acceptance Tests; 5.2 Single-Version Fault Tolerance; 5.2.1 Wrappers; 5.2.2 Software Rejuvenation; 5.2.3 Data Diversity; 5.2.4 Software Implemented Hardware Fault Tolerance (SIHFT); 5.3 N-Version Programming; 5.3.1 Consistent Comparison Problem…”
    Libro electrónico
  20. 280
    Publicado 1995
    Tabla de Contenidos: “…Shared-Memory Parallel Programs; 2.1 Basic Concepts; 2.2 Parallel Application Set; 2.3 Simulation Environment; 2.4 Parallel Application Execution Model; 2.5 Parallel Execution under a PRAM Memory Model; 2.6 Parallel Execution with Shared Data Uncached…”
    Libro electrónico