Posted: 04 May 2009 05:49 PM PDT
The OPC Foundation defines standards for online data exchange between automation systems. They address access to current data (OPC DA), alarms and events (OPC A&E) and historical data (OPC HDA). Those standards are successfully applied in industrial automation.
The new OPC Unified Architecture (OPC UA) unifies the existing standards and brings them to state-of-the-art technology using service-oriented architecture (SOA). Main advantages of the new standard are:
Platform-independent technology allows the deployment of OPC UA beyond current OPC applications only running on Windows-based PC systems. OPC UA can also run on embedded systems as well as Linux / UNIX based enterprise systems.
The provided information can be generically modeled and therefore arbitrary information models can be provided using OPC UA.
This book gives an easy to understand introduction into OPC UA and explains the concepts of the standard and other relevant topics that are not directly addressed by the standard.
Posted: 04 May 2009 05:46 PM PDT
Social Computing in Homeland Security: Disaster Promulgation and Response presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.
About the Author
Amy Wenxuan Ding is an assistant professor at University of Illinois (USA). She received a PhD in information technology and cognitive science from Carnegie Mellon University (USA). She specializes in computational intelligence, mathematical description of natural intelligence, and advanced methods of modeling, simulation, and decision making. She has published numerous papers at various top-tiered academic journals. Currently she is an associate editor of the Journal of Defense Modeling and Simulation, and serves on the editorial boards of the International Journal of Social and Humanistic Computing and International Journal of Electronic Banking.
Posted: 04 May 2009 05:43 PM PDT
The book provides a comprehensive and in-depth view on the state-of-the-art embedded memory technologies. The book helps practicing engineers grasp key technology attributes and advanced design techniques in nano-scale VLSI design. It also helps them make decisions concerning the right design tradeoffs in real product development.
This book first provides an overview on the landscape and trend of embedded memory in various VLSI system designs, including high-performance microprocessor, low-power mobile handheld devices, micro-controllers, and various consumer electronics. It then shows an in-depth view on each different type of embedded memory technology, including high-speed SRAM, ultra-low-voltage and alternative SRAM, embedded DRAM, embedded nonvolatile memory, and emerging or so-called "universal" memories such as FeRAM, MRAM, and PRAM. Each topic covers all the key technology attributes from a product application perspective, ranging from technology scaling challenges to advanced circuit techniques for achieving optimal design tradeoff in performance and power. As VLSI systems become increasingly dependent on on-die memory to provide adequate memory bandwidth for various applications, the book gives readers a broader view of this important field and helps them to achieve their optimal design goals for different applications.
This book provides readers a broad knowledge on the entire embedded memory technologies in order to better comprehend the technologies and create optimal memory solutions in real applications.
Posted: 04 May 2009 04:59 PM PDT
Anatomy of The Curriculum
Each of the “First Time Programmers” series contains two workbooks, a Questions edition and an Answers edition, which is identical to the Questions edition but contains the answers to all the questions in blue text.
Posted: 04 May 2009 04:33 PM PDT
Posted: 04 May 2009 12:53 PM PDT
Lee Jordan, “Blogger: Beyond the Basics: Customize and promote your blog with original templates, analytics, advertising, and SEO”
Packt Publishing | ISBN: 184719317X | 2008 | 356 pages | PDF | 12,7 MB
This book will take you beyond the basics of Blogger, helping you take full advantage of the rich and powerful features of Blogger to transform your blog into a fresh and state-of-the-art blog as quickly and painlessly as possible. The book is aimed at current users of the Blogger platform who want to get the most out of Blogger and people who use a different blogging platform and are planning on switching to Blogger.
Blog owners who promote their own services, expertise, and products, and want to increase their blog’s success by pushing the limits of what Blogger can do will get the most out of this book. The book doesn’t require any specific knowledge of Blogger or the related technologies: RSS, CSS, HTML, and XML. Everything you need to know to grow beyond the basics is covered in this book. The companion website to this book (http://bloggerbeefedup.blogspot.com) includes free resource images and content.
Posted: 04 May 2009 12:48 PM PDT
CA, Jim Geier, Eric Geier, “Simple Computer Security: Disinfect Your PC”
Wiley | 2007 | ISBN: 047006854X | 332 pages | PDF | 7,8 MB
Hands-on guide to the CA Internet Security Suite, which includes Parental Controls (blocks offensive Web sites, controls program use, and monitors Internet activity); Anti-Spyware (sweeps PCs of malicious software like spyware and adware); Anti-Spam (ensures that computer users get messages from people they know, while redirecting messages from people they don’t);
Anti-Virus (detects and removes computer viruses); and Personal Firewall (prevents hackers from attacking a PC)
Posted: 04 May 2009 12:39 PM PDT
Harvey Cohn, “Advanced Number Theory”
Dover Publications | 1980 | ISBN: 048664023X | 288 pages | PDF | 9,2 MB
Eminent mathematician, teacher approaches algebraic number theory from historical standpoint. Demonstrates how concepts, definitions, theories have evolved during last 2 centuries. Abounds with numerical examples, over 200 problems, many concrete, specific theorems. Numerous graphs, tables.
Posted: 04 May 2009 12:35 PM PDT
Jaan Kiusalaas, “Numerical Methods in Engineering with MATLAB®”
Cambridge University Press | 2005 | ASIN: B000URVB0Q | 434 pages | PDF | 7,7 MB
Numerical Methods in Engineering with MATLAB® is a text for engineering students and a reference for practicing engineers, especially those who wish to explore the power and efficiency of MATLAB®. Examples and applications were chosen for their relevance to real world problems, and where numerical solutions are most efficient. Numerical methods are discussed thoroughly and illustrated with problems involving both hand computation and programming.
MATLAB® mfiles accompany each method and are available on the book web site. This code is made simple and easy to understand by avoiding complex bookkeeping schemes, while maintaining the essential features of the method. MATLAB® was chosen as the example language because of its ubiquitous use in engineering studies and practice. Moreover, it is widely available to students on school networks and through inexpensive educational versions. Explore numerical methods with MATLAB®, a great tool for teaching scientific computation.
Posted: 04 May 2009 12:28 PM PDT
Rick Lehtinen, G.T. Gangemi, “Computer Security Basics”
O’Reilly Media, Inc.; 2 ed | 2006 | ISBN: 0596006691 | 310 pages | CHM | 1,6 MB
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the book to consult.
This handbook describes complicated concepts such as trusted systems, encryption, and mandatory access control in simple terms. It tells you what you need to know to understand the basics of computer security, and it will help you persuade your employees to practice safe computing.
|You are subscribed to email updates from Download Free Computer Ebooks - NET BOOKS |
To stop receiving these emails, you may unsubscribe now.
|Email delivery powered by Google|
|Inbox too full? Subscribe to the feed version of Download Free Computer Ebooks - NET BOOKS in a feed reader.|
|If you prefer to unsubscribe via postal mail, write to: Download Free Computer Ebooks - NET BOOKS, c/o Google, 20 W Kinzie, Chicago IL USA 60610|