Description
Information Technology Workshop in MATLAB
| ISBN 13 | |
|---|---|
| ISBN 10 | |
| Edition | |
| No. of Pages | |
| Type of book | |
| Year | |
| Language | |
| Publisher | |
| Save | ₹44.7 (15% Off) |
| Price |
|
| Categories | AICTE Prescribed Textbooks |
| Condition Type | New |
| Country Origin | India |
Only 2 left in stock
Information Technology Workshop in MATLAB
1772 Views
Design and Analysis of Algorithms This book offers an in-depth exploration of designing and analysing algorithms. It covers topics such as algorithmic analysis, design principles, theoretical proofs, and practical applications. The content includes a logical example explaining the concepts, accompanied by a diverse range of solved and unsolved problems. Each problem is accom...
Buy now
1193 Views
Information Technology Workshop in MATLAB This book familiarizes the students to different domains of IT workshop. This covers one of the most widely used programming language i.e., MATLAB. Main purpose of this book is to help students and researchers to understand and apply the MATLAB programming language to applications in engineering science, biomedical science, etc. The ...
Buy now
1039 Views
Internet of Things This comprehensive textbook, Internet of Things (IoT), serves as an essential guide to the disruptive technological network that is reshaping the physical and digital worlds. Moving beyond simple connectivity, the book provides a robust, unit-by-unit exploration of the entire IoT ecosystem, from the foundational hardware components to the advanced data ana...
Buy now
1068 Views
Firewall And Network Protection This book offers a comprehensive exploration of modern network security, establishing a robust foundation for protecting digital assets in today’s threat landscape. It begins by grounding readers in the essential security principles—Confidentiality, Integrity, and Availability (CIA Triad)—and outlines the current spectrum of complex thre...
Buy now
910 Views
Computer Graphics And Multimedia Applications This comprehensive textbook, Computer Graphics and Multimedia Applications, serves as an essential guide to the theoretical foundations and practical implementations of modern digital visualization and interactive media. Designed to bridge the gap between abstract computer science concepts and tangible real-world applications, th...
Buy now
1003 Views
Cloud Computing This comprehensive textbook provides a structured and authoritative introduction to Cloud Computing. guiding readers from foundational principles to advanced real-world applications. It serves as an essential resource urce for students, IT professionals, and researchers seeking to master the technologies that power modem digital infrastructure The book clearl...
Buy now
20180 Views
“Mathematics-l” is included as a paper for the first year Diploma program. Syllabus of this book is strictly aligned as per model curriculum of AICTE, and academic content is combined with the concept of outcome-based education. Book cover five Units Trigonometry, Functions and Limit, Differential Calculus, Complex numbers and partial Fraction, Permutation and Combinatio...
Buy now
7252 Views
This book is intended to serve as a textbook for course 'switchgear and protection' for B. Tech/B.E. Degree students of Electrical Engineering. It will also serve as a text reference for the students of diploma in electrical engineering. The common topics included in the syllabi of almost all engineering institutions in India are covered in this book.
Buy now
54394 Views
Salient Features of this book:- 1. Covers Complete AICTE syllabus of Security of Cyber Physical Systems (IOT-O2) miner change degree course . 2. The basic of security and various types of security issues are explained 3. Different cryptography techniques and various security attacks are discussed. 4. Network security and how they are implemented in real ...
Buy now
10577 Views
This book is intended to serve as a basic text book for the students who attempt to pursue studies at various stages in Scientific and Engineering fields of various Indian Universities. The main aim of this book is to discuss the theory of mathematical analysis and to treat the subject matter rigorously to the beginners, keeping in view of the modern trends of examinations.
Buy now
2042 Views
Introduction to e-Governance This book gives detailed description about introduction to e-governance, information and communication technology trends, e-government project, e-governance life cycle, architecture of e-governance and cyber laws. Logical organization and wide variety of e-governance with their detailed explanations makes this book a perfect offering on the subje...
Buy now
13927 Views
There are many books available in the market on the proposed topic but none of them can be termed as comprehensive. Besides, students face many problems in understanding the language of this books. Keeping these points in mind, Artificial Intelligence was prepared, which should be simple enough to comprehend and comprehensive enough to encompass all the topics of different inst...
Buy now
8087 Views
The database in now the underlying framework of the information system, and has fundamentally changed the way many organizations operate. In particular, the developments in this technology over the last few years have produced systems that are more powerful and more intuitive to use. this has resulted in database systems becoming increasingly available to a winder variety of us...
Read more
1926 Views
Embedded Systems This book is designed for the course on Embedded Systems. It begins with the discussion on basics of embedded system and its features. The host processors, generally used in an embedded system design have been enumerated. In the process, the ARM processor, Digital Signal Processor, FPGA and ASIC have been introduced. Special types of interfacing standards ar...
Buy now
8414 Views
This book has been divided into two parts. The learning outcomes from each are as follows: PART -1 The reader will gain awareness of how fraudsters: - acquire one-time passwords via social engineering to commit OTP- based crimes. - exploit vulnerabili...
Buy now
We use cookies to give you a better experience, improve performance, analyze traffic, and to personalize content. By clicking "Allow All Cookies," you agree to allow the storing of cookies in your browser. To learn more, read our cookie policy.
Reviews
There are no reviews yet.