Computer architecture and logic design Books

190 products


  • Learning Systems Thinking

    O'Reilly Media Learning Systems Thinking

    15 in stock

    Book Synopsis

    15 in stock

    £35.99

  • Requirements Engineering Fundamentals: A Study

    Rocky Nook Requirements Engineering Fundamentals: A Study

    5 in stock

    Book SynopsisRequirements engineering tasks have become increasingly complex. In order to ensure a high level of knowledge and competency among requirements engineers, the International Requirements Engineering Board (IREB) developed a standardized qualification called the Certified Professional for Requirements Engineering (CPRE). The certification defines the practical skills of a requirements engineer on various training levels. This book is designed for self-study and covers the curriculum for the Certified Professional for Requirements Engineering Foundation Level exam as defined by the IREB. The 2nd edition has been thoroughly revised and is aligned with the curriculum Version 2.2 of the IREB. In addition, some minor corrections to the 1st edition have been included. About IREB: The mission of the IREB is to contribute to the standardization of further education in the fields of business analysis and requirements engineering by providing syllabi and examinations, thereby achieving a higher level of applied requirements engineering. The IRE Board is comprised of a balanced mix of independent, internationally recognized experts in the fields of economy, consulting, research, and science.The IREB is a non-profit corporation.

    5 in stock

    £24.75

  • Monolith to Microservices

    O'Reilly Media Monolith to Microservices

    15 in stock

    Book SynopsisHow do you detangle a monolithic system and migrate it to a microservices architecture? As a companion to Sam Newman’s extremely popular Building Microservices, this new book details a proven method for transitioning an existing monolithic system to a microservice architecture.

    15 in stock

    £33.74

  • Terraform  Up and Running 3e

    O'Reilly Media Terraform Up and Running 3e

    15 in stock

    Book SynopsisThis hands-on third edition, expanded and thoroughly updated for version 1.0 and beyond, shows you the fastest way to get up and running with Terraform.

    15 in stock

    £39.74

  • Continuous Delivery for Kubernetes

    Manning Publications Continuous Delivery for Kubernetes

    4 in stock

    Book SynopsisTake the fast track in your journey to continuous delivery, with open source tools for Kubernetes and cloud applications. This book explores the tools and techniques you'll need to overcome common cloud native challenges. In Continuous Delivery for Kubernetes you will learn how to: Select the right open source project to solve challenges with your Kubernetes application Package, version, distribute and instant cloud native services using Helm Create and run pipelines using Tekton Plan and implement a multicloud strategy with Crossplane Implement risk-free and progressive upgrades with Knative Utilize Knative for serving, routing, and event-driven applications Automate testing, even when you don't have all your services up and running Troubleshoot and measure application performance Continuous Delivery for Kubernetes lays out a toolbox of free, open source projects you can use to implement continuous delivery for Kubernetes-based applications in the cloud. Each chapter covers a different project, clearly demonstrating how it simplifies essential CD tasks like packaging, building pipelines, and multi-cloud deployment. This book shows developers and architects confidently identify common patterns in successful open source tools so they can pick the right options for their own platforms. about the technology Continuous delivery practices help your team quickly introduce, iterate on, and deploy new features so you can get software into production quickly. The tools in this book help facilitate continuous delivery practices by solving the technical and architectural challenges commonly found when adopting Kubernetes, automating essential dev and deployment tasks, and improving your team's collaboration. about the book Continuous Delivery for Kubernetes accelerates development of cloud-based systems with vibrant open source tools of the Kubernetes ecosystem. You'll use powerful open source projects like Helm, Tekton, Knative, and Crossplane to automate your projects from testing through delivery. Learn how to package services, build and deploy services to a Kubernetes cluster, and combine different tools to solve the complex challenges of CD in a cloud native environment. RETAIL SELLING POINTS Select the right open source project to solve challenges with your Kubernetes application Package, version, distribute and instant cloud native services using Helm Utilize Knative for serving, routing, and event-driven applications Automate testing, even when you don't have all your services up and running Troubleshoot and measure application performance AUDIENCE For developers and software architects familiar with the basics of containers and Kubernetes. Trade Review'A great intro to best practices regarding continuous delivery in the cloud.' Rahul Jain 'The material is really excellent: the explanations are clear and the illustrative examples are practical and relevant.' Alain Lompo 'A great soup-to-nuts book for learning about CD for Kubernetes-native applications.' Kent SpillnerTable of Contentstable of contents detailed TOC READ IN LIVEBOOK 1CLOUD-NATIVE CONTINUOUS DELIVERY READ IN LIVEBOOK 2CLOUD-NATIVE APPLICATION CHALLENGES READ IN LIVEBOOK 3SERVICE AND ENVIRONMENT PIPELINES READ IN LIVEBOOK 4MULTI-CLOUD INFRASTRUCTURE READ IN LIVEBOOK 5RELEASE STRATEGIES READ IN LIVEBOOK 6EVENTS FOR CLOUD-NATIVE INTEGRATIONS READ IN LIVEBOOK 7FUNCTIONS FOR KUBERNETES 8 BUILDING A PLATFORM DESIGNED FOR CD 9 THE ROAD TO CONTINUOUS & PROGRESSIVE DELIVERY

    4 in stock

    £39.09

  • FPGA Prototyping by VHDL Examples

    John Wiley & Sons Inc FPGA Prototyping by VHDL Examples

    15 in stock

    Book SynopsisA hands-on introduction to FPGA prototyping and SoC design This Second Edition of the popular book follows the same learning-by-doing approach to teach the fundamentals and practices of VHDL synthesis and FPGA prototyping. It uses a coherent series of examples to demonstrate the process to develop sophisticated digital circuits and IP (intellectual property) cores, integrate them into an SoC (system on a chip) framework, realize the system on an FPGA prototyping board, and verify the hardware and software operation. The examples start with simple gate-level circuits, progress gradually through the RT (register transfer) level modules, and lead to a functional embedded system with custom I/O peripherals and hardware accelerators. Although it is an introductory text, the examples are developed in a rigorous manner, and the derivations follow strict design guidelines and coding practices used for large, complex digital systems. The new edition is completely Table of ContentsPreface ix Acknowledgments xv PART I BASIC DIGITAL CIRCUITS DEVELOPMENT 1 Gate-level Combinational Circuit 1 1.1 Overview of VHDL 1 1.2 General description 2 1.3 Structural description 6 1.4 Top-level signal mapping 8 1.5 Testbench 9 1.6 Bibliographic notes 11 1.7 Suggested experiments 11 2 Overview of FPGA and EDA software 13 2.1 FPGA 13 2.2 Overview of the Digilent Nexys 4 DDR board 15 2.3 Development flow 16 2.4 Xilinx Vivado Design Suite 18 2.5 Bibliographic notes 18 2.6 Suggested experiments 18 3 RT-level combinational circuit 23 3.1 RT-level components 23 3.2 Routing circuit with concurrent assignment statements 29 3.3 Modeling with a process 34 3.4 Routing circuit with if and case statements 36 3.5 Constants and generics 41 3.6 Replicated structure 44 3.7 Design examples 46 3.8 Bibliographic notes 58 3.9 Suggested experiments 58 4 Regular Sequential Circuit 61 4.1 Introduction 61 4.2 HDL code of the FF and register 64 4.3 Simple design examples 67 4.4 Testbench for sequential circuits 72 4.5 Case study 75 4.6 Timing and clocking 87 4.7 Bibliographic notes 90 4.8 Suggested experiments 90 5 FSM 93 5.1 Introduction 93 5.2 FSM code development 97 5.3 Design examples 100 5.4 Bibliographic notes 110 5.5 Suggested experiments 110 6 FSMD 113 6.1 Introduction 113 6.2 Code development of an FSMD 119 6.3 Design examples 125 6.4 Bibliographic notes 140 6.5 Suggested experiments 141 7 RAM and Buffer of FPGA 145 7.1 Embedded memory of FPGA device 145 7.2 General description for RAM-like component 147 7.3 FIFO buffer 153 7.4 HDL templates for memory inference 158 7.5 Overview of memory controller 164 7.6 Bibliographic notes 166 7.7 Suggested experiments 166 PART II EMBEDDED SOC I: VANILLA FPRO SYSTEM 8 Overview of Embedded SoC Systems 171 8.1 Embedded SoC 171 8.2 Development Flow of Embedded SoC 173 8.3 FPro SoC Platform 176 8.4 Adaption on Digilent Nexys 4 DDR board 180 8.5 Portability 182 8.6 Organization 184 8.7 Bibliographic notes 184 9 Bare Metal System Software Development 187 9.1 Bare metal system development overview 187 9.2 Memory-mapped I/O 189 9.3 Direct I/O Register Access 191 9.4 Robust I/O Register Access 193 9.5 Techniques for low-level I/O operations 197 9.6 Device Drivers 199 9.7 FPro Utility Routines and Directory Structure 204 9.8 Test program 208 9.9 Bibliographic notes 211 9.10 Suggested experiments 211 10 FPro Bus Protocol and MMIO Slot Specification 213 10.1 FPro Bus 213 10.2 Interface with bus 216 10.3 MMIO I/O core 222 10.4 Timer core development 226 10.5 MMIO controller 229 10.6 MCS I/O bus and bridge 234 10.7 Vanilla FPRO System Construction 238 10.8 Bibliographic notes 240 10.9 Suggested experiments 240 11 UART Core 243 11.1 Introduction 243 11.2 UART Construction 245 11.3 UART core development 253 11.4 UART driver 256 11.5 Additional Project Ideas 262 11.6 Bibliographic notes 265 11.7 Suggested experiments 266 PART III EMBEDDED SOC II: BASIC I/O CORES 12 Xilinx XADC Core 271 12.1 Overview of XADC 271 12.2 XADC core development 273 12.3 XADC core device driver 278 12.4 Sampler FPro System 281 12.5 Additional Project Ideas 291 12.6 Bibliographic notes 292 12.7 Suggested experiments 292 13 Pulse Width Modulation Core 295 13.1 Introduction 295 13.2 PWM Design 296 13.3 PWM core development 299 13.4 PWM driver 302 13.5 Testing 303 13.6 Project ideas 304 13.7 Suggested experiments 305 14 Debouncing core and LED-Mux Core 307 14.1 Debouncing Core 307 14.2 LED-Mux Core 313 14.3 Project Ideas 319 14.4 Suggested Experiments 320 15 SPI Core 323 15.1 Overview 323 15.3 SPI Core Development 333 15.4 SPI Driver 336 15.5 Test 338 15.6 Project Ideas 341 15.7 Bibliographic notes 342 15.8 Suggested Experiments 342 16 I2C Core 347 16.1 Overview 347 16.2 I2C Controller 350 16.3 I2C Core Development 360 16.4 I2C Driver 361 16.5 Test 365 16.6 Project Idea 366 16.7 Bibliographic notes 367 16.8 Suggested experiments 367 17 PS2 Core 371 17.1 Introduction 371 17.2 PS2 Controller 373 17.3 PS2 core development 383 17.4 PS2 driver 384 17.5 Test 393 17.6 Bibliographic notes 394 17.7 Suggested experiments 394 18 Sound I: DDFS Core 397 18.1 Introduction 397 18.2 Design and implementation 397 18.3 Fixed-point arithmetic 400 18.4 DDFS Construction 402 18.5 DAC (digital-to-analog converter) 404 18.6 DDFS core development 407 18.7 DDFS driver 409 18.8 Testing 412 18.9 Bibliographic notes 413 18.10 Suggested experiments 413 19 Sound II: ADSR Core 415 19.1 Introduction 415 19.2 ADSR envelope generator 416 19.3 ADSR core development 421 19.4 ADRS driver 423 19.5 Testing 429 19.6 Project Idea 430 19.7 Bibliographic notes 431 19.8 Suggested experiments 431 PART IV EMBEDDED SOC III: VIDEO CORES 20 Introduction to Video System 435 20.1 Introduction to a video display 435 20.2 Stream interface 437 20.3 VGA Synchronization 439 20.4 Bar test-pattern generator 448 20.5 Color-to-grayscale conversion circuit 449 20.6 Demo video system 451 20.7 Advanced video standards 452 20.8 Bibliographic notes 453 20.9 Suggested experiments 454 21 FPro Video Subsystem 457 21.1 Organization of video subsystem 457 21.2 FPro video IP core 461 21.3 Example video cores 466 21.4 FPro video synchronization core 470 21.5 Daisy video subsystem 479 21.6 Vanilla daisy FPro system 486 21.7 Video driver and testing program 490 21.8 Bibliographic notes 493 21.9 Suggested experiments 493 22 Sprite Core 497 22.1 Introduction 497 22.2 Basic design 498 22.3 Mouse pointer core 500 22.4 “Ghost” character core 505 22.5 Sprite core driver and testing program 513 22.6 Bibliographic notes 516 22.7 Suggested experiments 516 23 On-Screen-Display Core 519 23.1 Introduction to tile graphics 519 23.2 Basic OSD design 521 23.3 OSD core 524 23.4 OSD core driver and testing program 530 23.5 Bibliographic notes 532 23.6 Suggested experiments 532 24 VGA Frame Buffer Core 535 24.1 Overview 535 24.2 Frame buffer core 536 24.3 Register map 540 24.4 Driver and testing program 542 543 24.5 Project Ideas 545 24.6 Bibliographic notes 547 24.7 Suggested experiments 547 PART V EPILOGUE 25 What Next 553 References 557 Appendix A: Tutorials 561 A.1 Overview of Xilinx Vivado IDE 561 A.2 Short tutorial on Vivado hardware development 565 A.3 Short tutorial on Vivado simulation 570 A.4 Tutorial on IP instantiation 574 A.5 Short tutorial on FPro system development 580 A.6 Bibliographic notes 587 Topic Index 589

    15 in stock

    £83.66

  • Software Mistakes and Tradeoffs

    Manning Publications Software Mistakes and Tradeoffs

    7 in stock

    Book SynopsisIn Software Mistakes and Tradeoffs you'll learn from costly mistakes that Tomasz Lelek and Jon Skeet have encountered over their impressive careers. You'll explore real-world scenarios where poor understanding of tradeoffs lead to major problems down the road, to help you make better design decisions. Plus, with a little practice, you'll be able to avoid the pitfalls that trip up even the most experienced developers. Software Mistakes and Tradeoffs teaches you how to make better decisions about designing, planning, and implementing applications. You'll analyse real-world scenarios where the wrong tradeoff decisions were made, and discover what could have been done differently. The book lays out the pros and cons of different approaches and explores evergreen patterns that will always be relevant to software design. Code performance versus simplicity. Delivery speed versus duplication. Flexibility versus maintain ability—everydecision you make in software engineering involves balancing tradeoffs. Often, decisions that look good at the design stage can prove problematic in practice.This book reveals the questions you need to be asking to make the right decisions for your own software tradeoffs. Trade Review“I can saywith confidence that 100% of software developers ask themselves at least onequestion addressed in this book.” Nelson González “The code examples are good enough that even if you don't have experience with Java—you can still understand what the authors aretrying to convey.” John Henry Galino “Tomasz Lelek and Jon Skeet are here to guide developers through the minefield of software engineering.” Gilles Lachelini “Reading this book will make you wiser and turn youinto the Yoda of the Software Engineering biz!” Gregory Varghese “If you need a book to learn how to think like a better programmer...then this is the book.” Alex Saez “This book is vital for every developer, from beginner to advanced, to improve your code quality and resolve common problems.”Andres Sacco “This book holds valuable information and tips every programmer should know before doing bigger software projects.” RobertTrausmuth

    7 in stock

    £34.19

  • Micro Frontends in Action

    Manning Publications Micro Frontends in Action

    3 in stock

    Book SynopsisBy adopting the micro frontends approach and designing your web apps as systems of features, you can deliver faster feature development, easier upgrades, and pick and choose the technology you use in your stack. Micro Frontends in Action is your guide to simplifying unwieldy frontends by composing them from small, well-defined units. You’ll learn to integrate web applications made up of smaller fragments using tools such as web components or server side includes, how to solve the organizational challenges of micro frontends, and how to create a design system that ensures an end user gets a consistent look and feel for your application. Key Features · Applying integration strategies with iframes, AJAX, server-side includes, web components and the app-shell approach · Optimizing for performance and asset delivery strategies · Designing coherent user interfaces · Migrating to a micro frontends architecture For intermediate web developers, team leaders, and software architects. About the technology The micro frontends approach extends the principles of microservices to frontend development. The application is divided into multiple independent vertical slices–from the database right up to the UI–then integrated using standards such as web components into a single user-facing frontend. Thanks to the smaller scope of a micro frontend, teams can deliver features faster, upgrade more easily, and make their own choices about their technology stack. Michael Geers is a software developer specializing in building user interfaces. He has written software for the web since he was a teenager. In the last few years, he has worked on various customer projects with verticalized architectures. He shares his experiences on this topic at international conferences, in a series of magazine articles, and website.Table of ContentsWelcomeMEAP VERSION 41 What Are Micro Frontends?2 My First Micro Frontends Project3 Composition with AJAX & Server-side Routing4 Server-side Composition5 Client-side Composition6 Communication Patterns7 Client-side Routing & The Application Shell8 Composition & Universal Rendering9 Which Architecture Fits My Project?10 Asset Loading11 Performance is Key12 User Interface & Design System13 Teams & Boundaries14 Migration, Local Development & Testing

    3 in stock

    £29.99

  • But How Do It Know

    John C. Scott But How Do It Know

    15 in stock

    15 in stock

    £12.95

  • Architecting Modern Data Platforms

    O'Reilly Media Architecting Modern Data Platforms

    3 in stock

    Book SynopsisIdeal for enterprise architects, IT managers, application architects, and data engineers, this book shows you how to overcome the many challenges that emerge during Hadoop projects.

    3 in stock

    £53.99

  • ASP.NET Core Razor Pages in Action

    Manning Publications ASP.NET Core Razor Pages in Action

    1 in stock

    Book SynopsisRazor Pages lets you build, configure, and deploy amazing dynamic ASP.NET websites with ease. In ASP.NET Core Razor Pages in Action you will learn: Building, configuring, and publishing a data-driven website Creating a complete web application step-by-step Forms for collecting and processing user data Connecting to databases from a Razor Page Protecting areas of a Razor Page from unauthorized access with ASP.NET Identity Using Object Relational Mapping tools to work with data in Razor Pages applications Generating CRUD pages using scaffolding gestures Generating and sending email from your web application ASP.NET Core Razor Pages in Action teaches you to develop dynamic websites using the powerful Razor Pages framework, .NET 6, and ASP.NET. Razor Pages generates HTML on the server, and is the perfect choice for eCommerce sites, intranet services, content management systems, and other apps that require reliability. In this book, you'll use Razor Pages to build a complete application for booking city breaks, learning to iterate amazing new features chapter-by-chapter. about the technology Razor Pages sits on top of .NET 6 as a key part of ASP.NET Core, and has become the recommended tool for any developer building websites with Microsoft technologies. The page-focused framework is great for building dynamic websites that change frequently, and simplifies the process of building complex applications. about the book ASP.NET Core Razor Pages in Action shows you how to use Razor Pages to create dynamic websites that are easy to test and scale. You'll go hands-on to build a complete vacation-booking application, incorporating new framework features and adding complexities as they're introduced. As the application unfolds, you'll see how Razor Pages simplifies all the essential tasks of web development, from form creation and data processing, to easy publication and deployment. You'll also learn to enhance your web applications with the huge ecosystem of C# libraries, and how to locate the perfect tool for your task using centralized repositories.Trade Review'If you need to develop LoB applications, particularly CRUD apps, this book will give you the tools.' Paul Brown 'A great resource to learn Razor Pages.' Lee Cottrell 'A high degree of clarity, with excellent diagrams and code examples.' Mike BaranTable of Contentstable of contents detailed TOC PART 1: GETTING STARTED READ IN LIVEBOOK 1GETTING STARTED WITH RAZOR PAGES READ IN LIVEBOOK 2YOUR FIRST APPLICATION READ IN LIVEBOOK 3WORKING WITH RAZOR PAGES READ IN LIVEBOOK 4MATCHING URLS TO RAZOR PAGES WITH ROUTING PART 2: APPLICATION DEVELOPMENT READ IN LIVEBOOK 5WORKING WITH FORMS - MODEL BINDING READ IN LIVEBOOK 6WORKING WITH FORMS - TAG HELPERS READ IN LIVEBOOK 7USING DEPENDENCY INJECTION TO MANAGE SERVICES READ IN LIVEBOOK 8WORKING WITH DATA READ IN LIVEBOOK 9MANAGING USERS WITH AUTHENTICATION READ IN LIVEBOOK 10CONTROLLING ACCESS WITH AUTHORIZATION READ IN LIVEBOOK 11CLIENT-SIDE TECHNOLOGIES AND AJAX PART 3: GOING LIVE READ IN LIVEBOOK 12TROUBLESHOOTING YOUR APPLICATION READ IN LIVEBOOK 13PROTECTING YOUR APPLICATION AGAINST EXTERNAL ATTACKS 14 PUBLISHING YOUR APPLICATION

    1 in stock

    £39.09

  • Raspberry Pi User Guide

    John Wiley & Sons Inc Raspberry Pi User Guide

    15 in stock

    Book SynopsisLearn the Raspberry Pi 3 from the experts! Raspberry Pi User Guide, 4th Edition is the "unofficial official" guide to everything Raspberry Pi 3. Written by the Pi's creator and a leading Pi guru, this book goes straight to the source to bring you the ultimate Raspberry Pi 3 manual.Table of ContentsIntroduction 1 Programming is Fun! 1 A Bit of History 3 So What Can You Do with the Raspberry Pi? 8 Part I The Board 11 Chapter 1 Meet the Raspberry Pi 13 A Trip Around the Board 13 Model A/B 16 Model A+/B+ 16 Raspberry Pi 2 17 Raspberry Pi 3 18 Raspberry Pi Zero 19 A Bit of Background 20 ARM Versus x86 20 Windows Versus Linux 21 Chapter 2 Getting Started with the Raspberry Pi 23 Connecting a Display 23 Composite Video 24 HDMI Video 25 DSI Video 26 Connecting Audio 26 Connecting a Keyboard and Mouse 27 Installing NOOBS on an SD Card 29 Connecting External Storage 30 Connecting the Network 31 Wired Networking 32 Wireless Networking 33 Connecting Power 34 Installing the Operating System 35 Installing Using NOOBS 35 Installing Manually 37 Connecting Bluetooth Devices 41 Chapter 3 Linux System Administration 43 Linux: An Overview 43 Linux Basics 46 Introducing Raspbian 46 About Raspbian’s Parent, Debian 51 Alternatives to Raspbian 51 Using External Storage Devices 52 Creating a New User Account 54 File System Layout 54 Logical Layout 55 Physical Layout 57 Installing and Uninstalling Software 57 Managing Software Graphically 57 Managing Software at the Command Line 58 Finding the Software You Want 60 Installing Software 61 Uninstalling Software 62 Upgrading Software 62 Shutting the Pi Down Safely 63 Chapter 4 Troubleshooting 65 Keyboard and Mouse Diagnostics 65 Power Diagnostics 66 Display Diagnostics 68 Boot Diagnostics 69 Network Diagnostics 69 Chapter 5 Network Configuration 73 Wired Networking 73 Connecting to a Wired Network via the GUI 73 Connecting to a Wired Network via the Console 75 Testing Your Connectivity 76 Wireless Networking 76 Connecting to a Wireless Network via the GUI 77 Connecting to a Wireless Network via the Console 79 Chapter 6 The Raspberry Pi Configuration Tool 85 Running the Tool 85 The System Tab 86 Filesystem 86 Password 87 Hostname 88 Boot 88 Auto Login 88 Network at Boot 89 Overscan 89 Rastrack 89 The Interfaces Tab 90 Camera 91 SSH 91 SPI 91 I2C 91 Serial 91 1-Wire 92 Performance 92 Overclock 92 GPU Memory 94 Localisation 94 Locale 94 Timezone 96 Keyboard 96 Chapter 7 Advanced Raspberry Pi Configuration 99 Editing Configuration Files via NOOBS 99 Hardware Settings: config.txt 101 Modifying the Display 102 Boot Options 105 Overclocking the Raspberry Pi 106 Disabling L2 Cache 110 Enabling Test Mode 110 Memory Partitioning 111 Software Settings: cmdline.txt 112 Part II Building a Media Centre or Productivity Machine 115 Chapter 8 The Pi as a Home Theatre PC 117 Playing Music at the Console 117 Dedicated HTPC with OSMC 119 Streaming Internet Media 122 Streaming Local Network Media 123 Configuring OSMC 124 Chapter 9 The Pi as a Productivity Machine 127 Using Cloud-Based Apps 127 Using LibreOffice 130 Image Editing with the Gimp 131 Part III Programming the Pi 135 Chapter 10 An Introduction to Scratch 137 Introducing Scratch 137 Example 1: Hello World 138 Example 2: Animation and Sound 141 Example 3: A Simple Game 144 Interfacing Scratch with Hardware .149 Further Reading 152 Chapter 11 An Introduction to Python 153 Introducing Python 153 Example 1: Hello World 154 Example 2: Comments, Inputs, Variables, and Loops 159 Example 3: Gaming with pygame 164 Example 4: Python and Networking 172 Further Reading 179 Chapter 12 Minecraft Pi Edition 181 Introducing Minecraft Pi Edition 181 Installing Minecraft 182 Running Minecraft 182 Exploration 184 Hacking Minecraft 185 Part IV Hardware Hacking 191 Chapter 13 Learning to Hack Hardware 193 Electronic Equipment 193 Reading Resistor Colour Codes 195 Sourcing Components 197 Online Sources 197 Offline Sources 198 Hobby Specialists 199 Moving Up from the Breadboard 199 A Brief Guide to Soldering 202 Chapter 14 The GPIO Port 207 Identifying Your Board Revision 207 GPIO Pinout Diagrams 208 GPIO Features 210 UART Serial Bus 211 I2C Bus 211 SPI Bus 211 Using the GPIO Port in Python 212 GPIO Output: Flashing an LED 212 GPIO Input: Reading a Button 216 Soldering the Raspberry Pi Zero’s GPIO Header 220 Chapter 15 The Raspberry Pi Camera Module 223 Why Use the Camera Module? 224 Choosing a Camera Module 224 Installing the Camera Module 225 Enabling Camera Mode 228 Capturing Stills 230 Recording Video 232 Command-Line Time-Lapse Photography 233 Chapter 16 Add-On Hardware 237 Official Raspberry Pi Case 238 Installation 239 Raspberry Pi 7" Touchscreen Display 240 Installation 241 Sense HAT 244 Installation 245 Programming the Sense HAT 247 Part V Appendixes 251 Appendix A Python Recipes 253 Raspberry Snake (Chapter 11, Example 3) 253 IRC User List (Chapter 11, Example 4) 255 GPIO Input and Output (Chapter 14) 257 Appendix B Raspberry Pi Camera Module Quick Reference 259 Shared Options 259 Raspistill Options 264 Raspivid Options 266 Appendix C HDMI Display Modes 269 Index 277

    15 in stock

    £19.19

  • Good Code, Bad Code: Think like a software

    Manning Publications Good Code, Bad Code: Think like a software

    15 in stock

    Book Synopsis"Helps explain some of the knowledge gaps between enthusiastic new graduates and grouchy old gray beards like myself." - Joe Ivans Practical techniques for writing code that is robust, reliable, and easy for team members to understand and adapt. Good code or bad code? The difference often comes down to how you apply the conventions, style guides, and other established practices of the software development community. In Good Code, Bad Code you'll learn how to boost your effectiveness and productivity with code development insights normally only learned through years of experience, careful mentorship, and hundreds of code reviews. In Good Code, Bad Code you'll learn how to:- Think about code like an effective software engineer- Write functions that read like a well-structured sentence- Ensure code is reliable and bug free- Effectively unit test code- Identify code that can cause problems and improve it- Write code that is reusable and adaptable to new requirements- Improve your medium and long-term productivity- Save you and your team's time about the technologyCoding in a development team requires very different skills to working on personal projects. Successful software engineers need to ensure that their code is reusable, maintainable, and easy for others to understand and adapt. about the bookGood Code, Bad Code is a shortcut guide to writing high-quality code. Your mentor is Google veteran Tom Long, who lays out lessons and mindsets that will take your code from “junior developer” to “senior engineer.” This instantly-useful book distils the principles of professional coding into one comprehensive and hands-on beginner's guide. You'll start with a jargon-free primer to coding fundamentals that teaches you to think about abstractions, consider your fellow engineers, and write code that can recover from errors. Next, you'll dive into specific techniques and practices. You'll run through common coding practices to learn when to apply the right technique to your problem—and which might be best avoided! All practices are illustrated with annotated code samples written in an instantly recognizable pseudocode that you can relate to your favourite object-oriented language. By the time you're done, you'll be writing the kind of readable, reusable, and testable code that's the mark of a true software professional. about the readerFor coders looking to improve their experience in professional software development. about the authorTom Long is a software engineer at Google. He works as a tech lead, mentoring and teaching professional coding practices to new graduates and beginner software engineers.Trade Review“A wealth of knowledge to sharpen your toolset.” Joe Ivans,California Regional MLS “Pragmatic advice and useful tips for a career in software development.” George Thomas, Manhattan Associates “A practical, informative book designed to help developers writehigh-quality, effective code.” Christopher Villanueva, IndependentConsultant “Smart, well written, actionable information for creating maintainable code.” Hawley Waldman, Consultant

    15 in stock

    £35.99

  • R in Action

    Manning Publications R in Action

    15 in stock

    Book SynopsisBuilt specifically for statistical computing and graphics, the R language, along with its amazing collection of libraries and tools, is one of the most powerful tools you can use to tackle data analysis for business, research, and other data-intensive domains. This revised and expanded third edition of R in Action covers the new tidy verse approach to data analysis and R's state-of-the-art graphing capabilities with the ggplot2 package. R in Action, Third Edition teaches you to use the R language, including the popular tidy verse packages, through hands-on examples relevant to scientific, technical, and business developers. Focusing on practical solutions to real-world data challenges, R expert RobKabacoff takes you on a crash course in statistics, from dealing with messy and incomplete data to creating stunning visualisations. The R language is the most powerful platform you can choose for modern data analysis. Free and open source, R's community has created thousands of modules to tackle challenges from data-crunching to presentation. R's graphical capabilities are also state-of-the-art, with a comprehensive and powerful feature set available for data visualization. R runs on all major operating systems and is used by businesses, researchers, and organizations worldwide.Trade Review“Read it and masterthe invaluable art of solving data analysis problems efficiently: a must!” AlainLompo “Excellent primer for starting R.” Martin Perry “The book gives a amazing introduction to R and the applicable methods for machine learning and statistics.” Nicole Koenigstein “Amusing writing style and great material ingeneral, great book for those who are beginning in Statistics programming.” LuisFelipe Medeiro Alves “This is an awesome book on R.” Tiklu Ganguly “The definitive guide to bring you from beginner to advanced with R.” Jean-François Morin “A clear and comprehensive guide to using R forreal work. I was able to get an R environment up and running with minimal difficulty!” Jim Frohnhofer

    15 in stock

    £43.12

  • Managing Cloud Native Data on Kubernetes

    O'Reilly Media Managing Cloud Native Data on Kubernetes

    10 in stock

    Book SynopsisUsing Kubernetes as your platform, you'll learn open source technologies that are designed and built for the cloud. Authors Jeff Carpenter and Patrick McFadin provide case studies to help you explore new use cases and avoid the pitfalls others have faced.

    10 in stock

    £47.99

  • Art of Unit Testing, The

    Manning Publications Art of Unit Testing, The

    15 in stock

    Book SynopsisThe Art of Unit Testing, Third Edition updates an international bestseller to reflect modern development tools and practices. This expanded edition teaches you to write unit tests for async and observable code, as well as methods of faking functions, modules and refactorings. You'll explore test patterns and organization, working with legacy code, and even "untestable" code. The many tool-agnostic examples are presented in JavaScript, and are carefully designed so that they apply to code written in any language. about the technology Unit testing is a universally-adopted practice on dev teams of all sizes. Great developers will tell you that testing is as much a state of mind as a collection of tools and practices. The Art of Unit Testing, Third Edition takes you below the surface and understand how unit testing can transform the way you deliver and maintain software. Now with examples in JavaScript, this new edition has been updated to reflect the characteristics of a modern codebase, including async and modularized, distributed services. The practices and patterns you'll learn can also be easily applied to other languages, including C#, Java, and Python. about the book The Art of Unit Testing, Third Edition guides you step by step from your first simple unit tests to building complete test sets that are maintainable, readable, and trustworthy. Now with examples using JavaScript and Node, this expanded third edition teaches you to write unit tests for async and observable code, as well as methods of faking functions, modules and refactorings. You'll get to grips with complex subjects such as mocks and stubs, explore how to handle tricky legacy codebases, and save yourself time with tests that function for both frontend and backend applications. The Art of Unit Testing, Third Edition is an essential guide for any unit tester who wants to feel confident writing code that's easier to create, maintain, and adapt.Trade Review"A book that is seeing a third release must be awesome and this book certainly is." - Sander Zegveld "A didactic and entertaining approach to learning the intricacies of unit testing. Gives the the reader a solid mental framework to work with." - Adriaan Beiertz "Previous editions of the book were widely regarded as one of the best books in Unit Testing. The decision to update it to include examples in JavaScript (according to most surveys, the most used programming language in the world) is a smart move, making the book more directly applicable to most programmers, regardless of their server-side stack." - Jaume Lopez "This book is a must read, for any one who would like to be a better javascript developer or wants to start integrating Unit-Tests into their development process. It is a great balance between technical background and hand on examples." - Charles Lam

    15 in stock

    £35.09

  • BDD in Action

    Manning Publications BDD in Action

    1 in stock

    Book SynopsisAlmost half of all software projects fail to deliver on key requirements. Behavior-Driven Development (BDD) reduces these costly failures by building a shared understanding of how an application should work. Behavior Driven Development in Action, Second Edition teaches communication skills, collaborative practices, and automation tools that ensure everyone from developers to non-technical stakeholders are in agreement on the goals of a project. Revised and expanded in a second edition, the book contains new techniques for incorporating BDD into large-scale development practices such as Agile and DevOps, as well as updating examples for the latest versions of Java. about the technology You can't write good software if you don't understand what it's supposed to do. Behavior-Driven Development (BDD) encourages developers, quality teams, and non-technical stakeholders to collaborate, using conversation and concrete examples to make sure everyone agrees how an application should work and what features really matter. With a body of best practices and sophisticated tools for requirement analysis and test automation, BDD has become a mainstream practice for keeping projects on track and avoiding cancellation. what's inside BDD theory and practice How BDD will affect your team BDD for acceptance, integration, and unit testing Automating web services Reporting and living documentation about the reader For all development teams. No experience with BDD required. Examples written in Java.

    1 in stock

    £39.09

  • TensorFlow 2.0 in Action

    Manning Publications TensorFlow 2.0 in Action

    15 in stock

    Book SynopsisTensorFlow is a one-stop solution for building, monitoring, optimizing,and deploying your models. This practical guide to building deep learning models with the new features of TensorFlow 2.0is filled with engaging projects, simple language, and coverage of the latest algorithms. TensorFlow 2.0 in Action teaches you to use the new features of TensorFlow 2.0 to create advanced deep learning models. You'll learn by building hands-on projects including an image classifier that can recognize objects, a French-to-English machine translator, and even a neural network that can write fiction. You'll dive into the details of modern deep learning techniques including both transformer and attention models, and learn how pretrained models can solve your tricky data science- problems. TensorFlow is the go-to framework for putting deep learning into production. Created by Google, this ground breaking tool handles repetitive low-level operations and frees you up to focus on innovating your AIs.TensorFlow encompasses almost every element of a deep learning pipeline—aone-stop solution for building, monitoring, optimizing, and deploying your models.Trade Review“Excellent explanations and walk throughs to help bring you up to speed in Tensorflow 2.” Todd Cook “The illustrations of technical concepts are excellent.” BrianGriner “A hands-on introduction to effective Tensorflow use for real worlds problems.” Francisco Rivas “Mr Ganegedara goes to great lengths, with the exemplary use of many figures, to explain not only TensorFlow 2 solutions themselves but also the mechanics of the technology. Highly recommended!” TonyHoldroyd “An excellent resource to learning Tensorflow 2.0 using practical examples.” Biswanath Chowdhury “The conversation on writing custom layer was probably the best discussion on that I've ever seen. I learned a lot from that chapter.” LeviMcClenny “In you want to gain a deep knowledge of deep learning, read this book.”Tiklu Ganguly

    15 in stock

    £36.09

  • Digital Design and Computer Architecture, RISC-V Edition

    Elsevier Science & Technology Digital Design and Computer Architecture, RISC-V Edition

    15 in stock

    Book SynopsisTable of Contents1. From Zero to One 2. Combinational Logic Design 3. Sequential Logic Design 4. Hardware Description Languages 5. Digital Building Blocks 6. Architecture 7. Microarchitecture 8. Memory Systems 9. I/O Systems e9. I/O Systems A. Digital System Implementation eA. Digital System Implementation B. ARM Instructions C. C Programming eC. C Programming

    15 in stock

    £71.09

  • Design Recipes for FPGAs

    Elsevier Science Design Recipes for FPGAs

    1 in stock

    Book SynopsisTrade Review"...a great book for someone wanting to learn HDL design as the examples are crystal-clear, and it can be hard to find real-world HDL examples on the ‘net. The chapter on a CPU design alone will teach one a lot about coding for FPGAs." --Embedded.com "Design Recipes for FPGAs is an excellent volume for engineers who work with FPGAs either regularly or occasionally... the book provides a handy shelf reference with examples for many useful functional blocks, ranging from relatively small illustrative syntactic and structural examples to more complex concepts. Whether you work in VHDL occasionally or every day, you'll find practical help in this book." --Lewin Edwards, Design Engineer and Technical AuthorTable of ContentsPart 1: Overview 1: Introduction 2: An FPGA Primer 3: A VHDL Primer: The Essentials 4: A Verilog Primer: The Essentials 5: Design Automation of FPGAs 6: Synthesis Part 2: Introduction to FPGA Applications 7: High Speed Video Application 8: Simple Embedded Processors Part 3: Designer’s Toolbox 9: Digital Filters 10: Secure Systems 11: Memory 12: PS/2 Mouse Interface 13: PS/2 Keyboard Interface 14: A Simple VGA Interface 15: Serial Communications Part 4: Optimizing Designs 16: Design Optimization 17: Behavioral Modeling in using HDLs 18: Mixed Signal Modeling 19: Design Optimization Example: DES Part 5: Fundamental Techniques 20: Latches, Flip-Flops, and Registers 21: ALU Functions 22: Finite State Machines in VHDL and Verilog 23: Fixed Point Arithmetic 24: Counters 25: Decoders and Multiplexers 26: Multiplication 27: Simple 7-Segment (LCD) Displays

    1 in stock

    £43.69

  • An Introduction to Parallel Programming

    Elsevier Science & Technology An Introduction to Parallel Programming

    15 in stock

    Book SynopsisTable of Contents1. Why parallel computing 2. Parallel hardware and parallel software 3. Distributed memory programming with MPI 4. Shared-memory programming with Pthreads 5. Shared-memory programming with OpenMP 6. GPU programming with CUDA 7. Parallel program development 8. Where to go from here

    15 in stock

    £62.99

  • Hardware Security

    Elsevier Science Hardware Security

    1 in stock

    Book SynopsisTable of Contents1. Introduction to Hardware Security Part I: Background on Electronic Hardware2. A Quick Overview of Electronic Hardware3. System-on-Chip (SoC) Design and Test4. Printed Circuit Board (PCB) Design and Test Part II: HARDWARE ATTACKS: ANALYSIS, EXAMPLES & THREAT MODELS5. Hardware Trojans6. Electronics Supply Chain7. Hardware IP Piracy and Reverse Engineering8. Side-Channel Attacks9. Test-Oriented Attacks10. Physical Attacks and Countermeasures11. Attacks on PCB: Security Challenges and Vulnerabilities Part III: COUNTERMEASURES AGAINST HARDWARE ATTACKS12. Hardware Security Primitives13. Security and Trust Assessment, and Design for Security14. Hardware Obfuscation15. PCB Authentication and Integrity Validation Part IV: EMERGING TRENDS IN HARDWARE ATTACKS AND PROTECTIONS16. System Level Attacks and Countermeasures Appendix A: The Hardware Hacking (HaHa) Platform for Hands-on Training

    1 in stock

    £71.24

  • Multicore and GPU Programming

    Elsevier Science & Technology Multicore and GPU Programming

    1 in stock

    Book SynopsisTable of ContentsPart A: Introduction 1. Introduction 2. Multicore and Parallel Program Design Part B: Programming with Threads and Processes 3. Shared-memory Programming: Threads 4. Concurrent Data Structures 5. Distributed Memory Programming MPI 6. GPU Programming: CUDA 7. GPU Programming: OpenCL Part C: Higher-level Programming 8. Shared-memory Programming: OpenMP 9. GPU Programming: OpenACC 10. The Thrust Template Library Part D: Advanced Topics 11. Load Balancing

    1 in stock

    £81.69

  • Computer Organization and Design RISCV Edition

    Elsevier Science & Technology Computer Organization and Design RISCV Edition

    1 in stock

    Book SynopsisTable of Contents1. Computer Abstractions and Technology 2. Instructions: Language of the Computer 3. Arithmetic for Computers 4. The RISC-V Processor 5. Large and Fast: Exploiting Memory Hierarchy 6. Parallel Processors from Client to Cloud Appendix A. The Basics of Logic Design B. Graphics and Computing GPUs C. Mapping Control to Hardware D. A Survey of RISC Architectures

    1 in stock

    £75.04

  • Quantum Computing Fundamentals

    Pearson Education (US) Quantum Computing Fundamentals

    1 in stock

    Book SynopsisDr. Chuck Easttom is the author of 31 books, including several on computer security, forensics, and cryptography. His books are used at more than 60 universities. He has also authored scientific papers (more than 70 so far) on digital forensics, cyber warfare, cryptography, and applied mathematics. He is an inventor with 22 computer science patents. He holds a Doctor of Science in cyber security (dissertation topic: a study of lattice-based cryptographic algorithms for post-quantum computing). He also has a Ph.D. in Technology, focusing on nanotechnology (dissertation title: The Effects of Complexity on Carbon Nanotube Failures) and a Ph.D. in Computer Science (dissertation title: On the Application of Graph Theory to Digital Forensics). He also has three master's degrees (one in applied computer science, one in education, and one in systems engineering). He is a senior member of the IEEE and a senior member of the ACM (Association of Computing Machinery) as well asTable of Contents Preface xvii Part I Preparatory Material Chapter 1: Introduction to Essential Linear Algebra 2 1.1 What Is Linear Algebra?.. . . . . . . . . . . . . . . . . . . . 3 1.2 Some Basic Algebra.. . . . . . . . . . . . . . . . . . . . . 4 1.3 Matrix Math.. . . . . . . . . . . . . . . . . . . . . . . . 10 1.4 Vectors and Vector Spaces.. . . . . . . . . . . . . . . . . . 23 1.5 Set Theory.. . . . . . . . . . . . . . . . . . . . . . . . . 25 1.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 29 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 29 Chapter 2: Complex Numbers 32 2.1 What Are Complex Numbers?.. . . . . . . . . . . . . . . . . 32 2.2 Algebra of Complex Numbers.. . . . . . . . . . . . . . . . . 34 2.3 Complex Numbers Graphically.. . . . . . . . . . . . . . . . 38 2.4 Vector Representations of Complex Numbers.. . . . . . . . . . 45 2.5 Pauli Matrices.. . . . . . . . . . . . . . . . . . . . . . . 48 2.6 Transcendental Numbers.. . . . . . . . . . . . . . . . . . . 56 2.7 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 58 Chapter 3: Basic Physics for Quantum Computing 60 3.1 The Journey to Quantum.. . . . . . . . . . . . . . . . . . . 61 3.2 Quantum Physics Essentials.. . . . . . . . . . . . . . . . . 65 3.3 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 77 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 77 Chapter 4: Fundamental Computer Science for Quantum Computing 80 4.1 Data Structures.. . . . . . . . . . . . . . . . . . . . . . . 81 4.2 Algorithms.. . . . . . . . . . . . . . . . . . . . . . . . . 88 4.3 Computational Complexity.. . . . . . . . . . . . . . . . . . 93 4.4 Coding Theory.. . . . . . . . . . . . . . . . . . . . . . . 95 4.5 Logic Gates.. . . . . . . . . . . . . . . . . . . . . . . . 96 4.6 Computer Architecture.. . . . . . . . . . . . . . . . . . . 100 4.7 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 103 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 103 Chapter 5: Basic Information Theory 106 5.1 Basic Probability.. . . . . . . . . . . . . . . . . . . . . . 107 5.2 Set Theory.. . . . . . . . . . . . . . . . . . . . . . . . 108 5.3 Information Theory.. . . . . . . . . . . . . . . . . . . . . 112 5.4 Quantum Information.. . . . . . . . . . . . . . . . . . . . 118 5.5 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 120 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 120 Part II Basic Quantum Computing Chapter 6: Basic Quantum Theory 122 6.1 Further with Quantum Mechanics.. . . . . . . . . . . . . . . 123 6.2 Quantum Decoherence.. . . . . . . . . . . . . . . . . . . 129 6.3 Quantum Electrodynamics.. . . . . . . . . . . . . . . . . . 131 6.4 Quantum Chromodynamics.. . . . . . . . . . . . . . . . . 133 6.5 Feynman Diagram.. . . . . . . . . . . . . . . . . . . . . 134 6.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 136 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 136 Chapter 7: Quantum Entanglement and QKD 138 7.1 Quantum Entanglement.. . . . . . . . . . . . . . . . . . . 138 7.2 Interpretation.. . . . . . . . . . . . . . . . . . . . . . . 143 7.3 QKE.. . . . . . . . . . . . . . . . . . . . . . . . . . . 146 7.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 151 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 152 Chapter 8: Quantum Architecture 154 8.1 Further with Qubits.. . . . . . . . . . . . . . . . . . . . . 154 8.2 Quantum Gates.. . . . . . . . . . . . . . . . . . . . . . 158 8.3 More with Gates.. . . . . . . . . . . . . . . . . . . . . . 166 8.4 Quantum Circuits. . . . . . . . . . . . . . . . . . . . . . 167 8.5 The D-Wave Quantum Architecture.. . . . . . . . . . . . . . 169 8.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 172 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 172 Chapter 9: Quantum Hardware 174 9.1 Qubits.. . . . . . . . . . . . . . . . . . . . . . . . . . 174 9.2 How Many Qubits Are Needed?. . . . . . . . . . . . . . . . 181 9.3 Addressing Decoherence.. . . . . . . . . . . . . . . . . . 182 9.4 Topological Quantum Computing.. . . . . . . . . . . . . . . 186 9.5 Quantum Essentials.. . . . . . . . . . . . . . . . . . . . 187 9.6 Quantum Networking.. . . . . . . . . . . . . . . . . . . . 188 9.7 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 191 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 191 Chapter 10: Quantum Algorithms 194 10.1 What Is an Algorithm?. . . . . . . . . . . . . . . . . . . . 194 10.2 Deutsch’s Algorithm.. . . . . . . . . . . . . . . . . . . . 197 10.3 Deutsch-Jozsa Algorithm.. . . . . . . . . . . . . . . . . . 199 10.4 Bernstein-Vazirani Algorithm.. . . . . . . . . . . . . . . . . 201 10.5 Simon’s Algorithm.. . . . . . . . . . . . . . . . . . . . . 202 10.6 Shor’s Algorithm.. . . . . . . . . . . . . . . . . . . . . . 203 10.7 Grover’s Algorithm. . . . . . . . . . . . . . . . . . . . . 209 10.8 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 211 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 211 Part III Quantum Computing and Cryptography Chapter 11: Current Asymmetric Algorithms 212 11.1 RSA. . . . . . . . . . . . . . . . . . . . . . . . . . . 213 11.2 Diffie-Hellman.. . . . . . . . . . . . . . . . . . . . . . . 216 11.3 Elliptic Curve.. . . . . . . . . . . . . . . . . . . . . . . 219 11.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 227 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 227 Chapter 12: The Impact of Quantum Computing on Cryptography 228 12.1 Asymmetric Cryptography.. . . . . . . . . . . . . . . . . . 229 12.2 Specific Algorithms.. . . . . . . . . . . . . . . . . . . . . 231 12.3 Specific Applications. . . . . . . . . . . . . . . . . . . . 233 12.3.1 Digital Certificates. . . . . . . . . . . . . . . . . . 233 12.3.2 SSL/TLS. . . . . . . . . . . . . . . . . . . . . . 234 12.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 241 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 241 Chapter 13: Lattice-based Cryptography 244 13.1 Lattice-Based Mathematical Problems.. . . . . . . . . . . . . 245 13.2 Cryptographic Algorithms. . . . . . . . . . . . . . . . . . 249 13.3 Solving Lattice Problems.. . . . . . . . . . . . . . . . . . 256 13.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 259 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 259 Chapter 14: Multivariate Cryptography 262 14.1 Mathematics.. . . . . . . . . . . . . . . . . . . . . . . 262 14.2 Matsumoto-Imai.. . . . . . . . . . . . . . . . . . . . . . 264 14.3 Hidden Field Equations. . . . . . . . . . . . . . . . . . . 266 14.4 Multivariate Quadratic Digital Signature Scheme (MQDSS).. . . . 268 14.5 SFLASH.. . . . . . . . . . . . . . . . . . . . . . . . . 269 14.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 271 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 271 Chapter 15: Other Approaches to Quantum Resistant Cryptography 274 15.1 Hash Functions.. . . . . . . . . . . . . . . . . . . . . . 274 15.2 Code-Based Cryptography.. . . . . . . . . . . . . . . . . 279 15.3 Supersingular Isogeny Key Exchange.. . . . . . . . . . . . . 281 15.4 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 289 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 289 Part IV Quantum Programming Chapter 16: Working with Q# 292 16.1 Basic Programming Concepts.. . . . . . . . . . . . . . . . 292 16.2 Getting Started with Q#.. . . . . . . . . . . . . . . . . . . 298 16.3 Grover’s Algorithm. . . . . . . . . . . . . . . . . . . . . 303 16.4 Deutsch-Jozsa Algorithm.. . . . . . . . . . . . . . . . . . 307 16.5 Bit Flipping.. . . . . . . . . . . . . . . . . . . . . . . . 310 16.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 311 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 311 Chapter 17: Working with QASM 314 17.1 Basic Programming Concepts.. . . . . . . . . . . . . . . . 315 17.2 Getting Started with QASM.. . . . . . . . . . . . . . . . . 319 17.3 Quantum Error Correction. . . . . . . . . . . . . . . . . . 320 17.4 Grover’s Algorithm. . . . . . . . . . . . . . . . . . . . . 322 17.5 Deutsch-Jozsa Algorithm.. . . . . . . . . . . . . . . . . . 326 17.6 Summary.. . . . . . . . . . . . . . . . . . . . . . . . . 328 Test Your Skills. . . . . . . . . . . . . . . . . . . . . . . 328 Appendix: Answers to Test Your Skills Questions 330 9780136793816, TOC, 5/7/2021

    1 in stock

    £49.39

  • Tubes

    Penguin Books Ltd Tubes

    3 in stock

    Book SynopsisTubes: Behind the Scenes at the Internet by Andrew Blum is...''Utterly engrossing. The year''s most original and stimulating ''travel'' book. Even the most geek-wary of readers will enjoy'' Independent''Entertaining and illuminating. Excels at rooting the Internet in real-world locations. Full of memorable images that make its complex architecture easier to comprehend'' ObserverThe Internet. Home to the most important and intimate aspects of our lives. Our careers, our relationships, our selves, all of them are out there - online. So ... where is that exactly? And who''s in charge again? And what if it breaks?In Tubes Andrew Blum takes us on a gripping backstage tour of the real but hidden world of the Internet, introducing us to the remarkable clan of insiders and eccentrics who own, design and run it everyday. He uncovers the secret data warehouses where our online selves are stored, peels back the wires that tranTrade ReviewUtterly engrossing. The year's most original and stimulating 'travel' book. Even the most geek-wary of readers will enjoy * Independent, Book of the Week *Entertaining and illuminating. Excels at rooting the Internet in real-world locations. Full of memorable images that make its complex architecture easier to comprehend * Observer *An engaging reminder that, cyber-Utopianism aside, the Internet is as much a thing of flesh and steel as any industrial-age lumber mill or factory ... An excellent introduction to the nuts and bolts of how exactly it all works and a timely antidote to oft-repeated abstractions about "cyberspace" or "cloud computing" * Economist *Makes hard-to-grasp concepts easy to understand, even obvious. The history, in particular, is one of the best and most memorable I have ever read * New Scientist *A Quixotic and winning book with a knack for bundling packets of data into memorable observations. This valuable book leaves you with its share of unsettling visions, but there are comic ones too * The New York Times *For a full understanding of the Internet on every level, this book is a must-read * Techzone *A great, playful, wondrous read * ArsTechnica *Blum is perhaps the millennial generation's John McPhee, chronicling an arcane journey of deep relevance to everyday life. For non-techies, the book is a very accessible revelation * Forbes *All too awesome to behold. Andrew Blum's fascinating book demystifies the earthly geography of this most ethereal terra incognita -- Joshua Foer, author of Moonwalking with EinsteinA brilliantly smart idea executed with investigative skill and flair. Readers will never send an email so carelessly again. * Independent Books of the Year *Compelling and profound. You will never open an e-mail in quite the same way again -- Tom Vanderbilt, author of the New York Times bestseller TrafficOne of our best writers. A compelling story of an altogether new realm where the virtual world meets the physical -- Paul Goldberger, Pulitzer Prize-winning New Yorker criticThe Internet really IS a series of tubes! Who knew? * David Pogue, Technology Editor of The New York Times *At once funny, prosaic, sinister and wise, Blum's tale is a beautifully written account of the true human cost of all our remote connectivity -- Bella Bathurst, author of The Lighthouse StevensonsWith infectious wonder, Andrew Blum introduces us to the Internet's geeky wizards and takes us on an amiably guided tour of the world they've created ... the Internet that Blum's beautifully lucid prose makes real turns out to be if anything a more marvelous place than the cloudy dreamland we'd imagined -- Donovan Hohn, author of Moby DuckAn illuminating journey of discovery * Sunday Express *Total immersive reading * The Wharf *

    3 in stock

    £10.44

  • ARM SystemonChip Architecture

    Pearson Education Limited ARM SystemonChip Architecture

    1 in stock

    Book SynopsisSteve Furber has a long association with the ARM, having helped create the first ARM chips during the 1980s. Now an academic, but still actively involved in ARM development, he presents an authoritative perspective on the many complex factors that influence the design of a modern system-on-chip and the microprocessor core that is at its heart. This book represents the culmination of fifteen years of experience of ARM research and development and of teaching undergraduate, masters and industrial training courses in system-on-chip design using the ARM. Table of ContentsPreface. 1. An Introduction to Processor Design. 2. The ARM Architecture. 3. ARM Assembly Language Programming. 4. ARM Organization and Implementation. 5. The ARM Instruction Set. 6. Architectural Support for High-Level Languages. 7. The Thumb Instruction Set. 8. Architectural Support for System Development. 9. ARM Processor Cores. 10. Memory Hierarchy. 11. Architectural Support for Operating Systems. 12. ARM CPU Cores. 13. Embedded ARM Applications. 14. The AMULET Asynchronous ARM Processors. Appendix: Computer Logic. Glossary. Bibliography. Index.

    1 in stock

    £77.89

  • Smart Machines

    Columbia University Press Smart Machines

    15 in stock

    Book SynopsisTrade ReviewIf you think the tidal wave of digital disruption is over, think again. Kelly and Hamm pull back the curtain on the next great wave of the computing revolution, which will transform how every industry and business operates in the near future. -- David Rogers, author of The Network Is Your Customer: Five Strategies to Thrive in a Digital Age As Watson's win against Jeopardy! champion Ken Jennings showed, IBM's research labs are doing some of the world's most revolutionary research in artificial intelligence and related fields. In this short and very accessible book, the authors outline this work and the wave of 'cognitive computing' that is about the break. -- James Hendler, Rensselaer Polytechnic Institute This book will give the careful reader an understanding of the immense possibilities offered by the intelligent collaboration of man and machine; armed with this knowledge, readers can then tackle the difficult but essential task of ensuring that these new cognitive technologies will, in practice, be devoted to bettering our lives. -- Ralph Gomory, Stern School of Business, New York University Technological change, from new materials to smart systems, is accelerating, and the latest advances fuel others. John E. Kelly and Steve Hamm show how these technologies will transform our jobs, our cities-even how we think. -- Stephen Baker, author of Final Jeopardy: Man vs. Machine and the Quest to Know Everything IBM's Watson is one of the most important technological breakthroughs in decades, and this is the go-to book for understanding what this new technology is all about and how it will change your life. -- Tyler Cowen, George Mason University, author of Average Is Over This book is a gem... Highly recommended. CHOICETable of ContentsPreface by John E. Kelly III 1. A New Era of Computing 2. Building Learning Systems 3. Handling Big Data 4. Augmenting Our Senses 5. Designing Data-centric Computers 6. Inventing a New Physics of Computing 7. Imagining the Cognitive City Coda: An Alliance of Human and Machine Notes

    15 in stock

    £17.09

  • Cloud Computing: Theory and Practice

    Elsevier Science & Technology Cloud Computing: Theory and Practice

    15 in stock

    Book Synopsis

    15 in stock

    £49.46

  • Wireless and Mobile Networking

    Taylor & Francis Ltd Wireless and Mobile Networking

    15 in stock

    Book SynopsisThere has been phenomenal uptake of wireless and mobile networking technologies in the past decades. Significant developments have taken place during this time making the wireless technology more affordable, effective, and reliable. This book explains the fundamental principles and protocols of key existing and emerging wireless networking technologies. The book begins with a review of the fundamentals of wireless communications. It covers the basic theories and terminologies of coding and modulation, which maps digital information to the underlying signal, as well as the models to capture the dynamics of wireless signal propagation in the environment. It provides in-depth coverage of the WiFi evolution covering both the mainstream WiFi, which operates in 2.4/5GHz with new versions targeting 6GHz, as well as some of the niche WiFi standards that operate outside the mainstream bands such as 802.11af in 700MHz TV bands, 802.11ah in 900MHz to connect the Internet of Things (IoT), and 8Table of ContentsPart I: Introduction 1. Wireless and Mobile Networking: From Past to Present Part II: Physical Layer Fundamentals 2. Wireless Coding and Modulation 3. Wireless Signal Propagation Part III: WiFi and Wireless Local Area Networks 4. WiFi Basics 5. Mainstream WiFi Standards 6. Niche WiFi Part IV: Cellular Networks 7. Cellular Networks 8. 5G Networks Part V: Internet of Things 9. Internet of Things 10.Bluetooth 11. LoRa and LoRaWAN Part VI: Next Frontiers in Wireless Networking 12. Artificial Intelligence-assisted Wireless Networking 13.Wireless Sensing 14.Aerial Wireless Networks

    15 in stock

    £137.75

  • Remote Delivery

    Taylor & Francis Ltd Remote Delivery

    15 in stock

    Book SynopsisThis book records the author's years of experience in the software industry. In his own practices, the author has found that the distributed work pattern has become increasingly popular in more and more work environments, either between vendors and customers or between different teams inside a company. This means that all practitioners in the software industry need to adapt to this new way of communication and collaboration and get skilled enough to meet the greater challenges in integrating the distributed work pattern with agile software delivery. By centering on the difficulties in communication and collaboration between distributed teams, this book digs into the reasons why so many remote delivery projects end up anticlimactic and provides solutions for readers' reference. It also cites successful cases in promoting agile development in distributed teams, which has been a vexing problem for many software development companies. In addition, readers can find suggestions andTable of ContentsForeword 1: Taking Up Delivery Wholeheartedly. Foreword 2: Pursue Ideal Software Delivery. Preface. Chapter 1 Current Situation of Distributed Teams. Chapter 2 Communication between Distributed Teams. Chapter 3 Collaboration between Distributed Teams. Chapter 4 Application of Visualization. Chapter 5 Waste in Distributed Teams. Chapter 6 Self-Managed Offshore Teams. Chapter 7 Customer-Oriented Offshore Teams. Chapter 8 The Future of Distributed Teams. Postscript. References. Index.

    15 in stock

    £84.99

  • An Interdisciplinary Approach to Modern Network

    CRC Press An Interdisciplinary Approach to Modern Network

    1 in stock

    Book SynopsisAn Interdisciplinary Approach to Modern Network Security presents the latest methodologies and trends in detecting and preventing network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, practitioners, network analysts and technology specialists interested in the simulation and application of computer network protection. It presents theoretical frameworks and the latest research findings in network security technologies, while analyzing malicious threats which can compromise network integrity. It discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing and intrusion detection, this edited collection emboldens the efforts of researchers, academics and network administrators working in both the public and privatTable of ContentsChapter 1: Application of Artificial Intelligence in Cyber-security – A Detail Survey on Intrusion Detection System Chapter 2: IoMT data Security Approach: Blockchain in Healthcare Chapter 3: Machine Learning Approach for Network Intrusion Detection SystemChapter 4: Deep learning approach for network intrusion detection systemChapter 5: Firewalls and SecurityChapter 6: Application of Machine Learning and Deep Learning in Cyber Security: An Innovative ApproachChapter 7: A Modified Authentication Approach for Cloud computing in E-Healthcare SystemChapter 8: Advanced Security System in Video Surveillance for COVID-19Chapter 9: Secure Sound and Data Communication via Li-FiChapter 10: A Novel Secured Method for Rapid Data Accumulation in Energy Aware WSN

    1 in stock

    £99.75

  • Introduction to Industrial Internet of Things and

    CRC Press Introduction to Industrial Internet of Things and

    2 in stock

    Book SynopsisIndustrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead authorâs massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT.The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.Table of ContentsPart 1. Prerequisites. Chapter 1. Overview of Internet of Things. Part 2. Introduction. Chapter 2. Introduction to Industry 4.0 and Industrial Internet of Things. Chapter 3. Industry 4.0: Basics. Chapter 4. Industrial Internet of Things: Basics. Chapter 5. Business Models and Reference Architecture of IIoT. Part 3. Technological Aspects of Industry 4.0 and IIoT. Chapter 6. Key Technologies-Part 1. Chapter 7. Key Technologies-Part 2. Part 4. Enabling Technologies of IIoT. Chapter 8. Connectivity. Chapter 9. Communication. Chapter 10. Interoperability. Part 5. IIoT Analytics. Chapter 11. Introduction to Analytics. Chapter 12. Machine Learning and Data Science. Part 6. Applications and Case Studies. Chapter 13. Healthcare. Chapter 14. Inventory Management & Quality Control. Chapter 15. Plant Safety and Security. Chapter 16. Case Studies.

    2 in stock

    £71.24

  • Embedded System Design

    Elsevier Science & Technology Embedded System Design

    15 in stock

    Book SynopsisTable of Contents1. Introduction to Internet of Things (IoT) and Embedded Systems Part 1: Modelling 2. First Stage Modelling – Modelling Interaction between the System and the Environment 3. Finite State Machines 4. Modelling Physically Distributed Embedded Systems 5. Petri Nets for Modelling Concurrency and Shared Resources Part 2: Building Robust, Safe, and Correct Systems 6. Designing Systems that are Safe and Robust 7. Verification, Validation, and Evaluation 8. Testing Part 3: Hardware 9. Introduction and Overview 10. Processing Elements 11. Memories 12. Field Programmable Gate Arrays 13. Devices, Sensors, and Actuators 14. Energy 15. Hardware-Software Mapping Part 4: Software 16. Operating Systems 17. Scheduling 18. Semaphores 19. Optimization and Other Special Considerations Part 5: Communications 20. Introduction to Communications and Messages 21. Networks 22. The Internet 23. Low-level Communication Protocols 24. Cloud vs. Edge vs. Local Computing Part 6: The Internet of Things 25. Reference Models for the Internet of Things 26. IoT Issues

    15 in stock

    £62.06

  • Distributed Systems Security

    John Wiley & Sons Inc Distributed Systems Security

    15 in stock

    Book SynopsisHow to solve security issues and problems arising in distributed systems. Security is one of the leading concerns in developing dependable distributed systems of today, since the integration of different components in a distributed manner creates new security problems and issues. Service oriented architectures, the Web, grid computing and virtualization form the backbone of today's distributed systems. A lens to security issues in distributed systems is best provided via deeper exploration of security concerns and solutions in these technologies. Distributed Systems Security provides a holistic insight into current security issues, processes, and solutions, and maps out future directions in the context of today's distributed systems. This insight is elucidated by modeling of modern day distributed systems using a four-tier logical model host layer, infrastructure layer, application layer, and service layer (bottom to top). The authors provide an in-depth coverTable of ContentsChapter 1: Introduction 1.1 Background 1.2 Distributed Systems. 1.3 Distributed Systems Security. 1.4 About the Book. Chapter 2: Security Engineering. 2.1 Introduction. 2.2 Secure Development Life Cycle Processes – An Overview. 2.3 A Typical Security Engineering Process. 2.4 Important Security Engineering Guidelines and Resources. 2.5 Conclusion. Chapter 3. Common Security Issues and Technologies. 3.1 Security Issues. 3.2 Common Security Techniques. 3.3 Summary. Chapter 4 – Host level Threats and Vulnerabilities. 4.1 Background. 4.2 Malware. 4.3 Eavesdropping. 4.4 Job faults. 4.5 Resource starvation. 4.6 Overflow. 4.7 Privilege escalation. 4.8 Injection attacks. 4.9 Conclusion. Chapter 5 – Infrastructure Level Threats & Vulnerabilities. 5.1 Introduction. 5.2 Network Level Threats and Vulnerabilities. 5.3 Grid Computing Threats and Vulnerabilities. 5.4 Storage Threats and Vulnerabilities. Chapter 6: Application Level Vulnerabilities and Attacks. 6.1 Introduction. 6.2 Application Layer Vulnerabilities. 6.3 Conclusion. Chapter 7 – Service Level Issues, Threats and Vulnerabilities. 7.1 Introduction. 7.2 SOA and Role of Standards. 7.3 Service Level Security Requirements. 7.4 Service Level Threats and Vulnerabilities. 7.5 Service Level Attacks. 7.6 Services Threat Profile. 7.7 Conclusions. Chapter 8: Host level Solutions. 8.1 Background. 8.2 Sandboxing. 8.3 Virtualization. 8.4 Resource Management 8.5 Proof carrying code. 8.6 Memory firewall 8.7 Anti malware. 8.8 Conclusions. Chapter 9 – Infrastructure Level Solutions 9.1 Introduction. 9.2 Network Level Solutions. 9.3 Grid Level Solutions. 9.4 Storage Level Solutions. Chapter 10: Application Level Solutions. 10.1 Introduction. 10.2 Application Level Security Solutions. 10.3 Conclusion. Chapter 11 – Service Level Solutions. 11.1 Introduction. 11.2 Services Security Policy. 11.3 SOA Security standards stack. 11.4 Standards in Depth. 11.5 Deployment Architectures for SOA Security. 11.6 Managing Service Level Threats. 11.7 Service Threat Solution Mapping. 11.8 XML Firewall Configuration-Threat Mapping. 11.9 Conclusions. Chapter 12 - Case Study – Compliance in Financial Services. 12.1 Introduction. 12.2 SOX compliance. 12.3 SOX Security Solutions. 12.4 Multi-level policy driven solution architecture. 12.5 Conclusions. Chapter 13 – Case Study of Grid. 13.1 Background. 13.2 Financial Application. 13.3 Security Requirements Analysis. 13.4 Final Security Architecture. Chapter 14: Future directions and Conclusions. 14.1 Future directions. 14.2 Conclusions.

    15 in stock

    £74.66

  • Enterprise Software Architecture and Design

    John Wiley & Sons Inc Enterprise Software Architecture and Design

    15 in stock

    Book SynopsisThis book fills a gap between high-level overview texts that are often too general and low-level detail oriented technical handbooks that lose sight the big picture.This book discusses SOA from the low-level perspective of middleware, various XML-based technologies, and basic service design.It also examines broader implications of SOA, particularly where it intersects with business process management and process modeling.Concrete overviews will be provided of the methodologies in those fields, so that students will have a hands-on grasp of how they may be used in the context of SOA.Table of ContentsList of Figures xv Acknowledgements xxiii 1. Introduction 1 References / 6 2. Middleware 7 2.1 Enterprise Information Systems / 7 2.2 Communication / 12 2.3 System and Failure Models / 21 2.4 Remote Procedure Call / 34 2.5 Message-Oriented Middleware / 42 2.6 Web Services and Service-Oriented Architecture (SOA) / 46 2.7 Cloud Computing / 52 2.8 Naming and Discovery / 55 2.9 Further Reading / 56 References / 57 3. Data Modeling 59 3.1 Entities and Relationships / 60 3.1.1 Concepts and Entities / 60 3.1.2 Attributes and Relationships / 61 3.1.3 Properties of Relationship Types / 65 3.1.4 Special Relationship Types / 69 3.2 XML Schemas / 74 3.3 Defining New Types / 79 3.3.1 Defining Simple Types / 79 3.3.2 Defining Complex Types / 82 3.4 Derived Types / 85 3.4.1 Derived Simple Types / 86 3.4.2 Derived Complex Types / 87 3.5 Document Hierarchies / 94 3.6 Relationship Types in XML Schemas / 98 3.7 Metaschemas and Metamodels / 100 3.8 Further Reading / 102 References / 102 4. Data Processing 104 4.1 Processing XML Data / 104 4.1.1 Tree Processing / 105 4.1.2 Schema Binding / 109 4.1.3 Stream Processing / 114 4.1.4 External Processing / 119 4.2 Query Languages and XQuery / 122 4.3 XML Databases / 134 4.3.1 Storage as Relational Tables / 135 4.3.2 Storage as Large Strings / 137 4.3.3 Native XML Storage / 137 4.4 Web Services / 138 4.4.1 SOAP: (not so) Simple Object Access Protocol / 139 4.4.2 WSDL: Web Services Description Language / 145 4.4.3 Web Service Policy / 155 4.5 Presentation Layer: JSON and JQUERY / 159 References / 166 5. Domain-Driven Architecture 167 5.1 Software Architecture / 167 5.2 Domain-Driven Design / 168 5.3 Application Frameworks / 175 5.4 Domain-Specific Languages (DSLs) / 180 5.5 An Example API for Persistent Domain Objects / 188 5.6 Domain-Driven Architecture / 197 5.7 Further Reading / 205 References / 205 6. Service-Oriented Architecture 207 6.1 Services and Procedures / 207 6.2 Service-Oriented Architecture (SOA) / 211 6.3 Service Design Principles / 216 6.4 Service-Oriented Architecture (SOA) Governance / 218 6.5 Standardized Service Contract / 221 6.5.1 Operations Contract / 222 6.5.2 Data Contract / 223 6.5.3 Policy Contract / 224 6.5.4 Binding Contract / 226 6.5.5 Contract Versioning / 231 6.6 Service Loose Coupling / 237 6.6.1 Motivation for Loose Coupling / 237 6.6.2 Contract Development / 239 6.6.3 Loose Coupling Patterns / 242 6.6.4 Cost of Loose Coupling / 246 6.7 Service Abstraction / 248 6.7.1 Platform Abstraction / 248 6.7.2 Protocol Abstraction / 249 6.7.3 Procedural Abstraction / 261 6.7.4 State Abstraction / 264 6.7.5 Data Abstraction / 269 6.7.6 Endpoint Abstraction / 278 6.8 Service Reusability / 278 6.8.1 Parameterization and Bounded Polymorphism / 279 6.8.2 Subtyping, Inheritance, and Contracts / 284 6.8.3 Does Service-Oriented Architecture Require Subtyping? / 289 6.8.4 Patterns for Service Reusability / 292 6.9 Service Autonomy / 299 6.9.1 Replicating Computation / 300 6.9.2 Replicating State / 303 6.9.3 Sources of Errors and Rejuvenation / 308 6.9.4 Caching / 313 6.10 Service Statelessness / 323 6.10.1 Contexts and Dependency Injection / 331 6.11 Service Discoverability / 336 6.11.1 Global Discovery / 336 6.11.2 Local Discovery / 337 6.11.3 Layered Naming / 347 6.12 Further Patterns / 351 6.13 Further Reading / 352 References / 352 7. Resource-Oriented Architecture 359 7.1 Representational State Transfer / 359 7.2 RESTful Web Services / 369 7.3 Resource-Oriented Architecture (ROA) / 379 7.4 Interface Description Languages / 387 7.4.1 Web Services Description Language (WSDL) / 387 7.4.2 Web Application Description Language (WADL) / 390 7.5 An Example Application Program Interface (API) for Resource-Oriented Web Services / 396 7.6 Hypermedia Control and Contract Conformance / 406 7.7 Concluding Remarks / 412 7.8 Further Reading / 414 References / 414 Appendix A: Introduction to Haskell 416 A.1 Types and Functions / 416 A.2 Type Classes and Functors / 425 A.3 Monads / 431 A.4 Further Reading / 436 References / 436 Appendix B: Time in Distributed Systems 437 B.1 What Time Is It? / 437 B.2 Time and Causality / 443 B.3 Applications of Logical and Vector Time / 450 B.3.1 Mutual Exclusion / 450 B.3.2 Quorum Consensus / 451 B.3.3 Distributed Logging / 456 B.3.4 Causal Message Delivery / 458 B.3.5 Distributed Snapshots / 463 B.4 Virtual Time / 468 B.5 Further Reading / 470 References / 470 Index 473

    15 in stock

    £107.06

  • PatternOriented Software Architecture Patterns

    John Wiley & Sons Inc PatternOriented Software Architecture Patterns

    15 in stock

    Book SynopsisThe first volume of the POSA pattern series introduced a broad-spectrum of general-purpose patterns in software design and architecture. The second narrowed the focus to fundamental patterns for building sophisticated concurrent and networked software systems and applications.Table of ContentsForeword by Frank Buschmann. Foreword by Steve Vinoski. About This Book. About The Authors. Intended Audience. Structure of the Book. Guide to the Reader. Acknowledgements. About The Authors. 1. Introduction. 1.1 Overview of Resource Management. 1.2 Scope of Resource Management. 1.3 Usage of Patterns. 1.4 Patterns in Resource Management. 1.5 Related Work. 1.6 Pattern Form. 2. Resource Acquisition. Lookup. Lazy Acquisition. Eager Acquisition. Partial Acquisition. 3. Resource Lifecycle. Caching. Pooling. Coordinator. Resource Lifecycle Manager. 4. Resource Release. Leasing. Evictor. 5. Guidelines for Applying Resource Management. 6. Case Study: Ad Hoc Networking. 6.1 Overview. 6.2 Motivation. 6.3 Solution. 7. Case Study: Mobile Network. 7.1 Overview. 7.2 Motivation. 7.3 Solution. 8. The Past, Present, and Future of Patterns. 8.1 The Past Four Years at a Glance. 8.2 Where Patterns are Now. 8.3 Where Will Patterns Go Tomorrow? 8.4 A Brief Note about the Future of Patterns. 9. Concluding Remarks. Referenced Patterns. Notations. References. Acknowledgements. Index of Patterns. Index.

    15 in stock

    £30.00

  • Architecting Enterprise Solutions Patterns for

    John Wiley & Sons Inc Architecting Enterprise Solutions Patterns for

    15 in stock

    Book SynopsisBased on real--world problems and systems and illustrated with "war stories," this practical nuts--and--bolts guide to architectural solutions describes step--by--step how to design robustness and flexibility into a system. A running case study illustrates the evolution and iteration of the system as it grows in functionality and capability.Table of ContentsAcknowledgements. An All-Too-Common Story. Introduction. Part 1 Architecture, Patterns and Internet Technology. System Architecture. Internet Technology Systems. Architectural Patterns for Internet Technology Systems. The GlobalTech System. Part 2 The Patterns. Fundamental Patterns. System Performance Patterns. System Control Patterns. System Evolution Patterns. Part 3 Application of the Patterns. GlobalTech Revisited. Appplying the Patterns. Moving on from Here. Appendix Reference Patterns. Bibliography. Glossary.

    15 in stock

    £23.99

  • Low Power CMOS VLSI Design

    John Wiley & Sons Inc Low Power CMOS VLSI Design

    15 in stock

    Book SynopsisLow power circuit design is a rapidly-growing field of research driven by the popularity of portable computers and the introduction of multimedia systems that rely on portable hardware.Trade Review"This is a highly recommended book for all academic engineering libraries." (E-Streams, Vol. 4, No. 8, August 2001)Table of ContentsLow-Power CMOS VLSI Design. Physics of Power Dissipation in CMOS FET Devices. Power Estimation. Synthesis for Low Power. Design and Test of Low-Voltage CMOS Circuits. Low-Power Static Ram Architectures. Low-Energy Computing Using Energy Recovery Techniques. Software Design for Low Power. Index.

    15 in stock

    £137.66

  • Introduction to Structural Analysis  Design

    John Wiley & Sons Inc Introduction to Structural Analysis Design

    15 in stock

    Book SynopsisThis book is an introductory text on structural analysis and structural design. While the emphasis is on fundamental concepts, the ideas are reinforced through a combination of limited versatile classical techniques and numerical methods. Structural analysis and structural design including optimal design are strongly linked through design examples.Table of ContentsDeterminate Structural Systems. Structural Design Fundamentals. Computation of Deflections. Indeterminate Structural Systems. Matrix-Based Numerical Methods of Structural Analysis. Computer-Based Structural Analysis. Optimum Structural Design. Design of Steel and Concrete Structures. Bibliography. Answers to Selected Problems. Appendices. Index.

    15 in stock

    £238.46

  • HighSpeed Digital System Design

    John Wiley & Sons Inc HighSpeed Digital System Design

    15 in stock

    Book SynopsisA cutting-edge guide to the theory and practice of high-speed digital system design An understanding of high-speed interconnect phenomena is essential for digital designers who must deal with the challenges posed by the ever-increasing operating speeds of today''s microprocessors. This book provides a much-needed, practical guide to the state of the art of modern digital system design, combining easily accessible explanations with immensely useful problem-solving strategies. Written by three leading Intel engineers, High-Speed Digital System Design clarifies difficult and often neglected topics involving the effects of high frequencies on digital buses and presents a variety of proven techniques and application examples. Extensive appendices, formulas, modeling techniques as well as hundreds of figures are also provided. Coverage includes: * A thorough introduction to the digital aspects of basic transmission line theory * Crosstalk and nonideal transmissTrade Review"...an excellent guidebook for interconnect design...this very valuable work is highly recommended for design engineers and recent graduates struggling to transition from theory to real-world design." (Choice, Vol. 38, No. 8, April 2001) "This is an excellent book for anyone who has basic circuit theory knowledge.... It is a recommended book for all academic engineering libraries and would, also, be useful for the practicing engineer." (E-Streams, Vol. 4, No. 8, August 2001)Table of ContentsPreface. 1. The Importance of Interconnect Design. 1.1 The Basics. 1.2 The Past and the Future. 2. Ideal Transmission Line Fundamentals. 2.1 Transmission Line Structures on a PCB or MCM. 2.2 Wave Propagation. 2.3 Transmission Line Parameters. 2.3.1 Characteristic Impedance. 2.3.2 Propagation Velocity, Time, and Distance. 2.3.3 Equivalent Circuit Models for SPICE Simulation. 2.4 Launching Initial Wave and Transmission Line Reflections. 2.4.1 Initial Wave. 2.4.2 Multiple Reflections. 2.4.3 Effect of Rise Time on Reflections. 2.4.4 Reflections From Reactive Loads. 2.4.5 Termination Schemes to Eliminate Reflections. 2.5 Additional Examples. 2.5.1 Problem. 2.5.2 Goals. 2.5.3 Calculating the Cross-Sectional Geometry of the PCB. 2.5.4 Calculating the Propagation Delay. 2.5.5 Determining the Wave Shape Seen at the Receiver. 2.5.6 Creating an Equivalent Circuit. 3. Crosstalk. 3.1 Mutual Inductance and Mutual Capacitance. 3.2 Inductance and Capacitance Matrix. 3.3 Field Simulators. 3.4 Crosstalk-Induced Noise. 3.5 Simulating Crosstalk Using Equivalent Circuit Models. 3.6 Crosstalk-Induced Flight Time and Signal Integrity Variations. 3.6.1 Effect of Switching Patterns on Transmission Line Performance. 3.6.2 Simulating Traces in a Multiconductor System Using a Single-Line Equivalent Model. 3.7 Crosstalk Trends. 3.8 Termination of Odd- and Even-Mode Transmission Line Pairs. 3.8.1 Pi Termination Network. 3.8.2 T Termination Network. 3.9 Minimization of Crosstalk. 3.10 Additional Examples. 3.10.1 Problem. 3.10.2 Goals. 3.10.3 Determining the Maximum Crosstalk-Induced Impedance and Velocity Swing. 3.10.4 Determining if Crosstalk Will Induce False Triggers. 4. Nonideal Interconnect Issues. 4.1 Transmission Line Losses. 4.1.1 Conductor DC Losses. 4.1.2 Dielectric DC Losses. 4.1.3 Skin Effect. 4.1.4 Frequency-Dependent Dielectric Losses. 4.2 Variations in the Dielectric Constant. 4.3 Serpentine Traces. 4.4 Intersymbol Interference. 4.5 Effects of 90 Bends. 4.6 Effect of Topology. 5. Connectors, Packages, and Vias. 5.1 Vias. 5.2 Connectors. 5.2.1 Series Inductance. 5.2.2 Shunt Capacitance. 5.2.3 Connector Crosstalk. 5.2.4 Effects of Inductively Coupled Connector Pin Fields. 5.2.5 EMI. 5.2.6 Connector Design Guidelines. 5.3 Chip Packages. 5.3.1 Common Types of Packages. 5.3.2 Creating a Package Model. 5.3.3 Effects of a Package. 5.3.4 Optimal Pin-Outs. 6. Nonideal Return Paths, Simultaneous Switching Noise, and Power Delivery. 6.1 Nonideal Current Return Paths. 6.1.1 Path of Least Inductance. 6.1.2 Signals Traversing a Ground Gap. 6.1.3 Signals That Change Reference Planes. 6.1.4 Signals Referenced to a Power or a Ground Plane. 6.1.5 Other Nonideal Return Path Scenarios. 6.1.6 Differential Signals. 6.2 Local Power Delivery Networks. 6.2.1 Determining the Local Decoupling Requirements for High-Speed I/O. 6.2.2 System-Level Power Delivery. 6.2.3 Choosing a Decoupling Capacitor. 6.2.4 Frequency Response of a Power Delivery System. 6.3 SSO/SSN. 6.3.1 Minimizing SSN. 7. Buffer Modeling. 7.1 Types of Models. 7.2 Basic CMOS Output Buffer. 7.2.1 Basic Operation. 7.2.2 Linear Modeling of the CMOS Buffer. 7.2.3 Behavioral Modeling of the Basic CMOS Buffer. 7.3 Output Buffers That Operate in the Saturation Region. 7.4 Conclusions. 8. Digital Timing Analysis. 8.1 Common-Clock Timing. 8.1.1 Common-Clock Timing Equations. 8.2 Source Synchronous Timing. 8.2.1 Source Synchronous Timing Equations. 8.2.2 Deriving Source Synchronous Timing Equations from an Eye Diagram. 8.2.3 Alternative Source Synchronous Schemes. 8.3 Alternative Bus Signaling Techniques. 8.3.1 Incident Clocking. 8.3.2 Embedded Clock. 9. Design Methodologies. 9.1 Timings. 9.1.1 Worst-Case Timing Spreadsheet. 9.1.2 Statistical Spreadsheets. 9.2 Timing Metrics, Signal Quality Metrics, and Test Loads. 9.2.1 Voltage Reference Uncertainty. 9.2.2 Simulation Reference Loads. 9.2.3 Flight Time. 9.2.4 Flight-Time Skew. 9.2.5 Signal Integrity. 9.3 Design Optimization. 9.3.1 Paper Analysis. 9.3.2 Routing Study. 9.4 Sensitivity Analysis. 9.4.1 Initial Trend and Significance Analysis. 9.4.2 Ordered Parameter Sweeps. 9.4.3 Phase 1 Solution Space. 9.4.4 Phase 2 Solution Space. 9.4.5 Phase 3 Solution Space. 9.5 Design Guidelines. 9.6 Extraction. 9.7 General Rules of Thumb to Follow When Designing a System. 10. Radiated Emissions Compliance and System Noise Minimization. 10.1 FCC Radiated Emission Specifications. 10.2 Physical Mechanisms of Radiation. 10.2.1 Differential-Mode Radiation. 10.2.2 Common-Mode Radiation. 10.2.3 Wave Impedance. 10.3 Decoupling and Choking. 10.3.1 High-Frequency Decoupling at the System Level. 10.3.2 Choking Cables and Localized Power and Ground Planes. 10.3.3 Low-Frequency Decoupling and Ground Isolation. 10.4 Additional PCB Design Criteria, Package Considerations, and Pin-Outs. 10.4.1 Placement of High-Speed Components and Traces. 10.4.2 Crosstalk. 10.4.3 Pin Assignments and Package Choice. 10.5 Enclosure (Chassis) Considerations. 10.5.1 Shielding Basics. 10.5.2 Apertures. 10.5.3 Resonances. 10.6 Spread Spectrum Clocking. 11. High-Speed Measurement Techniques. 11.1 Digital Oscilloscopes. 11.1.1 Bandwidth. 11.1.2 Sampling. 11.1.3 Other Effects. 11.1.4 Statistics. 11.2 Time-Domain Reflectometry. 11.2.1 TDR Theory. 11.2.2 Measurement Factors. 11.3 TDR Accuracy. 11.3.1 Launch Parasitics. 11.3.2 Probe Types. 11.3.3 Reflections. 11.3.4 Interface Transmission Loss. 11.3.5 Cable Loss. 11.3.6 Amplitude Offset Error. 11.4 Impedance Measurement. 11.4.1 Accurate Characterization of Impedance. 11.4.2 Measurement Region in TDR Impedance Profile. 11.5 Odd- and Even-Mode Impedance. 11.6 Crosstalk Noise. 11.7 Propagation Velocity. 11.7.1 Length Difference Method. 11.7.2 Y-Intercept Method. 11.7.3 TDT Method. 11.8 Vector Network Analyzer. 11.8.1 Introduction to S Parameters. 11.8.2 Equipment. 11.8.3 One-Port Measurements (ZO,L,C). 11.8.4 Two-Port Measurements (Td, Attenuation, Crosstalk). 11.8.5 Calibration. 11.8.6 Calibration for One-Port Measurements. 11.8.7 Calibration for Two-Port Measurements. 11.8.8 Calibration Verification. Appendix A: Alternative Characteristic Impedance Formulas. A.1 Microstrip. A.2 Symmetric Stripline. A.3 Offset Stripline. Appendix B: GTL Current-Mode Analysis. B.1 Basic GTL Operation. B.2 GTL Transitions When a Middle Agent Is Driving. B.3 GTL Transitions When an End Agent With a Termination Is Driving. B.4 Transitions When There is a Pull-Up at the Middle Agent. Appendix C: Frequency-Domain Components in a Digital Signal. Appendix D: Useful S-Parameter Conversions. D.1 ABCD, Z, and Y Parameters. D.2 Normalizing the S Matrix to a Different Characteristic Impedance. D.3 Derivation of the Formulas Used to Extract the Mutual Inductance and Capacitance from a Short Structure Using S21 Measurements. D.4 Derivation of the Formula to Extract Skin Effect Resistance from a Transmission Line. Appendix E: Definition of the Decibel. Appendix F: FCC Emission Limits. Bibliography. Index.

    15 in stock

    £125.06

  • The Pentium Chronicles The People Passion and

    John Wiley & Sons Inc The Pentium Chronicles The People Passion and

    15 in stock

    Book SynopsisA landmark chip like the P6 or Pentium 4 doesn't just happen. It takes a confluence of brilliant minds, dedication for beyond the ordinary, and management that nurtures the vision while keeping a firm hand on the project tiller.Trade Review"...it reads like a novel...The story is chronicled by insider Colwell in a style that commands reader attention...highly recommended." (CHOICE, May 2006) "…an anecdotal account of its development from someone who was in on it from the start…there is something there for everyone about life in a large organization." (Cool Tech Reviews, March 6, 2006) "Such a perfect miscellany of…experiences finely blended with humor and reality is a sumptuous feast for engineers and project managers…marvelous piece of computer history." (TechBulletin, February 10, 2006) "This particular book on the genesis of Intel's groundbreaking P6 programme of the early 1990s...gives us some worthwhile pointers...a worthy book, and worth a recommendation..." (TechWorld, February 7, 2006) "This insightful book promises to become a classic, and the reader is warned that it is hard to put down." (Computing Reviews.com, February 23, 2005) "…the book will particularly appeal to engineers working in the computing industry." (Physics World, February 2006)Table of ContentsForeword. Preface. 1. Introduction. 2. The Concept Phase. 3. The Refinement Phase. 4. The Realization Phase. 5. The Production Phase. 6. The People Factor. 7. Inquiring Minds Like Yours. Bibliography. Appendix. Glossary. Index.

    15 in stock

    £40.80

  • PatternOriented Software Architecture A System of

    John Wiley & Sons Inc PatternOriented Software Architecture A System of

    15 in stock

    Book SynopsisBoth a tutorial and a reference guide, this manual presents a number of techniques for solving recurring software design problems in a comprehensive manner which includes many guidelines and constraints regarding practical applications.Table of ContentsAbout this Book xi Guide to the Reader xvii 1 Patterns 1 2 Architectural Patterns 25 3 Design Patterns 221 4 Idioms 345 5 Pattern Systems 359 6 Patterns and Software Architecture 383 7 The Pattern Community 413 8 Where Will Patterns Go? 419 9 Notations 429 Glossary 433 References 441 Index of Patterns 455 Index 459

    15 in stock

    £32.00

  • Performance of Computer Communication Systems

    John Wiley & Sons Inc Performance of Computer Communication Systems

    15 in stock

    Book SynopsisPerformance of Computer Communication Systems A Model-Based Approach Boudewijn R. Haverkort Rheinisch-Westfälische Technische Hochschule Aachen, Germany Computer communication systems and distributed systems are now able to provide an increasing range of services. As the timing requirements in the operation of these services are becoming crucial for the global community. performance assessment and selection of communication and distributed systems are, therefore, becoming more important. In this book, the author illustrates the techniques and methods used to evaluate the performance of computer communication systems, thereby covering all aspects of model-based performance evaluation. Unlike other books on this topic, there is no restriction to a particular performance evaluation technique. Notable features in this book include: * coverage of all major techniques of performance evaluation * non-mathematical problem solving approach, explaining and illustrating performance evaluaTrade Review"All the major techniques and methods used to evaluate the performance...of computer communications systems are in this book." (Aslib Book Guide, Vol. 64, No. 3, March 1999)Table of ContentsPartial table of contents: PERFORMANCE MODELLING WITH STOCHASTIC PROCESSES. Little's Law and the MM1 Queue. SINGLE-SERVER QUEUEING MODELS. MG1-FCFS Queueing Models. MG1 Queueing Models with Various Scheduling Disciplines. PHPH1 Queueing Models. Polling Models. QUEUEING NETWORK MODELS. Closed Queueing Networks. BCMP Queueing Networks. STOCHASTIC PETRI NET MODELS. Stochastic Petri Net Applications. Infinite-State SPNs. SIMULATION. Simulation: Methodology and Statistics. Appendices. Bibliography. Index.

    15 in stock

    £138.56

  • Digital Design

    Cambridge University Press Digital Design

    15 in stock

    Book SynopsisThis introductory textbook provides students with a system-level perspective and the tools they need to understand, analyze and design digital systems. Going beyond the design of simple combinational and sequential modules, it shows how such modules are used to build complete systems, reflecting real-world digital design. All the essential topics are covered, including design and analysis of combinational and sequential modules, as well as system timing and synchronization. It also teaches how to write Verilog HDL in a productive and maintainable style that enables CAD tools to do much of the tedious work. A complete introduction to digital design is given through clear explanations, extensive examples and online Verilog files. The teaching package is completed with lecture slides, labs and a solutions manual for instructors. Assuming no previous digital knowledge, this textbook is ideal for undergraduate digital design courses that will prepare students for modern digital practice.Trade Review'Dally and Harting blend circuit and architecture design in a clear and constructive manner on the basis of their exceptional experience in digital design. Students will discover a modern and effective way to understand the fundamental underpinning of digital design, by being exposed to the different abstraction levels and views of computing systems.' Giovanni De Micheli, École Polytechnique Fédérale de Lausanne'Bill and Curt have combined decades of academic and industry experience to produce a textbook that teaches digital system design from a very practical perspective without sacrificing the theoretical understanding needed to train tomorrow's engineers. Their approach pushes students to understand not just what they are designing but also what they are building. By presenting key advanced topics, such as synthesis, delay and logical effort, and synchronization, at the introductory level, this book is in the rare position of providing both practical advice and deep understanding. In doing so, this book will prepare students well even as technology, tools, and techniques change in the future.' David Black-Schaffer, Uppsala University'Everything you would expect from a book on digital design from [Professor] Dally. Decades of practical experience are distilled to provide the tools necessary to design and compose complete digital systems. A clear and well written text that covers the basics and system-level issues equally well. An ideal starting point for the microprocessor and SoC designers of the future!' Robert Mullins, University of Cambridge and the Raspberry Pi Foundation'This textbook sets a new standard for how digital system design is taught to undergraduates. The practical approach and concrete examples [provide] a solid foundation for anyone who wants to understand or design modern complex digital systems.' Steve Keckler, University of Texas, Austin'This book not only teaches how to do digital design, but more importantly shows how to do good design. It stresses the importance of modularization with clean interfaces, and the importance of producing digital artifacts that not only meet their specifications, but which can also be easily understood by others. It uses an aptly chosen set of examples and the Verilog code used to implement them … It includes a section on the design of asynchronous logic, a topic that is likely to become increasingly important as energy consumption becomes a primary concern in digital systems … The final appendix on Verilog coding style is particularly useful. This book will be valuable not only to students, but to practitioners in the area. I recommend it highly.' Chuck Thacker, Microsoft'A terrific book with a terrific point of view of systems. Everything interesting - and awful - that happens in digital design happens because engineers must integrate ideas from bits to blocks, from signals to CPUs. The book does a great job of focusing on the important stuff, moving from foundations to systems, with the right amount of HDL (Verilog) focus to make everything practical and relevant.' Rob A. Rutenbar, University of Illinois, Urbana-ChampaignTable of ContentsPart I. Introduction: 1. The digital abstraction; 2. The practice of digital system design; Part II. Combinational Logic: 3. Boolean algebra; 4. CMOS logic circuits; 5. Delay and power of CMOS circuits; 6. Combinational logic design; 7. Verilog descriptions of combinational logic; 8. Combinational building blocks; 9. Combinational examples; Part III. Arithmetic Circuits: 10. Arithmetic circuits; 11. Fixed- and floating-point numbers; 12. Fast arithmetic circuits; 13. Arithmetic examples; Part IV. Synchronous Sequential Logic: 14. Sequential logic; 15. Timing constraints; 16. Datapath sequential logic; 17. Factoring finite-state machines; 18. Microcode; 19. Sequential examples; Part V. Practical Design: 20. Verification and test; Part VI. System Design: 21. System-level design; 22. Interface and system-level timing; 23. Pipelines; 24. Interconnect; 25. Memory systems; Part VII. Asynchronous Logic: 26. Asynchronous sequential circuits; 27. Flip-flops; 28. Metastability and synchronization failure; 29. Synchronizer design; Appendix A. Verilog coding style; References; Index of Verilog modules; Subject index.

    15 in stock

    £60.99

  • Logic in Computer Science Modelling and Reasoning

    Cambridge University Press Logic in Computer Science Modelling and Reasoning

    1 in stock

    Book SynopsisThis second edition continues to provide a clear introduction to formal reasoning which is both relevant to the needs of modern computer science and rigorous enough for practical application. Improvements have been made throughout, with many extra and expanded sections and exercises. The coverage of model-checking has been substantially updated.Trade Review'… an unusual, inspiring and remarkable book … one can find in it all the material which is suitable for undergraduate and beginning graduate students in computer science and electrical engineering who will profit by using it in their professional activities in the near future.' Zentralblatt MATH'The second edition of this successful textbook continues to provide a clear introduction to formal reasoning relevant to the needs of modern computer science and sufficiently exacting for practical applications.' Phinews'This book provides an elegant introduction to formal reasoning that is relevant to computation science. This second edition improves the first one with extra and expanded sections on temporal logic model checking, SAT solvers, second-order logic, the Alloy specification language, and programming by contract. The material is up-to-date and practical …' Zentralblatt MATHTable of ContentsForeword; 1. Propositional logic; 2. Predicate logic; 3. Verification by model checking; 4. Program verification; 5. Modal logics and agents; 6. Binary decision diagrams; Bibliography; Index.

    1 in stock

    £52.24

  • Ones and Zeros

    John Wiley & Sons Inc Ones and Zeros

    15 in stock

    Book SynopsisThis book explains, in lay terms, the surprisingly simple system of mathematical logic used in digital computer circuitry. Anecdotal in its style and often funny, it follows the development of this logic system from its origins in Victorian England to its rediscovery in this century as the foundation of all modern computing machinery. ONES AND ZEROS will be enjoyed by anyone who has a general interest in science and technology.Table of ContentsBefore We Begin. Number Systems and Counting. The Basic Functions of Boolean Algebra: And, Or, And Not. Combinational Logic. The Algebra of Sets and Venn Diagrams. Other Boolean Functions. Realizing Any Boolean Function with And, Or, And Not. More Digital Circuits. Laws of Boolean Algebra. Boolean Logic. Appendix A: Counting in Base 2. Appendix B: Powers of 2. Appendix C: Summary of Boolean Functions. Further Reading. Answers to Exercises. Index. About the Author.

    15 in stock

    £71.06

  • Design of HighPerformance Microprocessor Circuits

    John Wiley & Sons Inc Design of HighPerformance Microprocessor Circuits

    15 in stock

    Book SynopsisThis book covers the design of next generation microprocessors in deep submicron CMOS technologies. The chapters in Design of High Performance Microprocessor Circuits were written by some of the world's leading technologists, designers, and researchers.Table of ContentsPreface. OVERVIEW. Impact of Physical Technology on Architecture (John H. Edmondson). TECHNOLOGY ISSUES. CMOS Scaling and Issues in SUB-0.25µm Systems (Yuan Taur). Techniques for Leakage Power Reduction (Vivek De, Yibin Ye, et al.). Low-Voltage Technologies (Tadahiro Kuroda and Takayasu Sakurai). SOI Technology and Circuits (Ghavam G. Shahidi, Fari Assaderaghi and Dimitri Antoniadis). Models of Process Variations in Device and Interconnect (Duane Boning and Sani Nassif). CIRCUIT STYLES FOR LOGIC. Basic Logic Families (Kerry Bernstein). Issues in Dynamic Logic Design (Paul Gronowski). Self-Timed Pipelines (Ted Williams). High-Speed VLSI Arithmetic Units: Adders and Multipliers (Vojin G. Oklobdzija). CLOCKING. Clocked Storage Elements (Hamid Partovi). Design of High-Speed CMOS PLLs and DLLs (John George Maneatis). Clock Distribution (Daniel W. Bailey). MEMORY SYSTEM DESIGN. Register Files and Caches (Ronald Preston). Embedded DRAM (Tadaaki Yamauchi and Michihiro Yamada). INTERCONNECT AND I/O. Analyzing On-Chip Interconnect Effects (Noel Menezes and Lawrence Pileggi). Techniques for Driving Interconnect (Shannon V. Morton). I/O and ESD Circuit Design (Stephen C. Thierauf and Warren R. Anderson). High-Speed Electrical Signaling (Stefanos Sidropoulos, Chih-Kong Ken Yang, and Mark Horowitz). RELIABILITY. Electromigration Reliability (J. Joseph Clement). Hot Carrier Reliability (Kaizad Mistry). CAD TOOLS AND TEST. Overview of Computer-Aided Design Tools (Yao-Tsung Yen). Timing Verification (Victor Peng). Design and Analysis of Power Distribution Networks (David Blaauw, Rajendran Panda, and Rajat Chaudhry). Testing of High-Performance Processors (Dilip K. Bhavsar). Index.

    15 in stock

    £197.06

© 2026 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account