Digital Systems Design Using VHDL
Download
http://depositfiles.com/files/edfin5shw
or
http://w15.easy-share.com/1702329859.html
or
http://letitbit.net/download/ad8752787337/DigSysDeVHDL.rar.html
DC Power System Design for Telecommunications
Publisher: Wiley-IEEE Press | Pages: 500 | 2006-10-20 | ISBN: 047168161X | PDF | 11 MB
Product Description:
Straightforward, systematic approach for designing reliable dc power systems for telecommunications
Here is a must-have resource for anyone responsible for designing, installing, and maintaining telecommunications systems. The text explains how to design direct current (dc) power systems that operate at nominal voltages of 24 and 48 volts dc, use lead-acid batteries, and are installed in public network telecommunications systems and other exclusive-use environments. Rather than train readers to design systems by rote, the author gives readers the skills and knowledge to perform systematic analyses to make the best choices based on several economic, operational, electrical, and physical considerations.
Written in a straightforward style that avoids unnecessary jargon and complex mathematics, the text covers all the essentials of dc power systems for telecommunications:
* Detailed descriptions of the seven major system components: Rectifier/charger System, Battery System, Charge Bus, Discharge Bus, Primary Distribution System, Secondary Distribution System, and Voltage Conversion System
* Detailed descriptions include design equations, reference tables, block diagrams, and schematics
* Design procedures to help readers select the most appropriate power system elements, such as buses, wiring, overcurrent protection, rectifiers, and batteries
* Application of the American National Standards Institute's telecommunications industry standards and other relevant standards, practices, and codes
* Strategies for dealing with voltage drop in distribution and battery circuits as well as guidance for sizing circuit wiring to meet voltage drop and current rating requirements
* In-depth discussions that focus on the types of lead-acid batteries used in telecommunications and their applications
Throughout the text, examples demonstrate how theory is applied to real-world telecommunications systems. Some 330 illustrations and more than 100 tables are also provided to help readers visualize and better understand complex systems. Design and application examples and accompanying solutions help readers understand the design process and use their new skills. In summary, engineers and technicians in the telecommunications industry will find all the resources they need to design reliable dc power systems.
Download
http://rapidshare.com/files/160165844/047168161X.zip
System Integration From Transistor Design to Large Scale Integrated Circuits
Wiley|16MB|ISBN-10: 0470854073|April 30, 2004|510 pages|English|PDF|rar
This book is based on one with the title VLSI Design, published by Oldenbourg for the first time in 1990 and followed by four further editions. A substantially revised version with the title System Integration was published by Oldenbourg in 2003 and is the basis for this book. It includes lectures which the author teaches at the Bundeswehr Uni- versity in Munich for graduate students and topics for adult education of professional engineers and physicists.
In order to introduce the book it is appropriate to consider more closely the history of silicon integrated circuits and how the design environment has changed over the years.
Download
http://depositfiles.com/files/w28hw8xde or http://w14.easy-share.com/1702225489.html
Intrusion Detection Systems with Snort, ebook
Intrusion Detection with SNORT: Advanced IDS Techniques Using SNORT, Apache, MySQL, PHP, and ACID (Bruce Perens' Open Source Series)Network security has become an important part of corporate IT strategy and safeguarding all the nooks and crannies of your network can be timely and expensive. This book provides information about how to use free Open Source tools to build and manage an Intrusion Detection System. Rehman provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data. The book contains custom scripts, real-life examples for SNORT, and to-the-point information about installing SNORT IDS so readers can build and run their sophisticated intrusion detection systems.SNORT is your network's packet sniffer that monitors network traffic in real time, scrutinizing each packet closely to detect a dangerous payload or suspicious anomalies.NSS Group, a European network security testing organization, tested SNORT along with intrusion detection system (IDS) products from 15 major vendors including Cisco, Computer Associates, and Symantec. According to NSS, SNORT, which was the sole Open Source freeware product tested, clearly outperformed the proprietary products.
From the Back Cover
Protect your network with Snort: the high-performance, open source IDS
Snort gives network administrators an open source intrusion detection system that outperforms proprietary alternatives. Now, Rafeeq Ur Rehman explains and simplifies every aspect of deploying and managing Snort in your network. You'll discover how to monitor all your network traffic in real time; update Snort to reflect new security threats; automate and analyze Snort alerts; and more. Best of all, Rehman's custom scripts integrate Snort with Apache, MySQL, PHP, and ACID-so you can build and optimize a complete IDS solution more quickly than ever before.
An expert introduction to intrusion detection and the role of Snort
Writing and updating Snort rules to reflect the latest attacks and exploits
Contains detailed coverage of Snort plug-ins, preprocessors, and output modules
Logging alerts to a MySQL database
Using ACID to search, process, and analyze security alerts
Using SnortSnarf to analyze Snort log files
XML support for Snort via the Simple Network Markup Language (SNML)
FTP Site
The accompanying ftp site contains all the software, scripts, and rules you need to get started with Snort.
Download
http://rapidshare.com/files/156666488/Intrusion.rar
0 comments:
Post a Comment