Name | Identifiers | Coverage |
---|---|---|
VHDL-2008 |
|
Fulltext |
Network Security: Know It All |
|
Fulltext |
Visual Thinking |
|
Fulltext |
Verification Techniques for System-Level Design |
|
Fulltext |
Kismet Hacking |
|
Fulltext |
Digital Signal Processing System Design (Second Edition) |
|
Fulltext |
Professional Penetration Testing |
|
Fulltext |
Disappearing Cryptography (Third Edition) |
|
Fulltext |
TCP/IP Sockets in C (Second Edition) |
|
Fulltext |
Building the Agile Enterprise |
|
Fulltext |