Book picks similar to
Quantum Circuit Simulation by George F. Viamontes


engineering-mathematics
grad
interesting
visualization-simulation

Intel Microprocessors 8086/8088, 80186/80188, 80286, 80386, 80486, Pentium, Prentium Proprocessor, Pentium II, III, 4


Barry B. Brey - 1991
    This text provides a comprehensive view of programming and interfacing of the Intel family of Microprocessors from the 8088 through the latest Pentium 4 microprocessor. Organized in an orderly and manageable format, it offers over 200 programming examples using the Microsoft Macro Assembler program, and provides a thorough description of each Intel family members, memory systems, and various I/O systems.

The 8088 and 8086 Microprocessors: Programming, Interfacing, Software, Hardware, and Applications


Walter A. Triebel - 1991
    This volume offers thorough, balanced, and practical coverage of both software and hardware topics. Develops basic concepts using the 8088 and 8086 microprocessors, but the 32-bit version of the 80x86 family is also discussed. Examines how to assemble, run, and debug programs, and how to build, test, and troubleshoot interface circuits. Provides detailed coverage of floating-point processing and the single instruction multiple data (DIMD) processing capability of the advanced Pentium processor. Includes added material on number systems, logic functions and operations, conversion between number systems, and addition/subtraction of binary numbers. Includes new advanced material such as floating Point Architecture and Instructions, Multimedia (MMX) Architecture and Instructions, and the hardware and hardware architecture of the Pentium 3 and Pentium 4 processors. Covers the Intel architecture microprocessor families: 8088, 8086, 80286, 80386, 80486, and the latest Pentium(R) processors. Illustrates commands of the DEBUG program and how to assemble, disassemble, load, save, execute, and debug programs on the IBM PC. Introduces the contents of the 8088's instruction set. Explores practical implementation techniques, covering the use of latches, transceivers, buffers, and programmable logic devices in the memory and I/O interfaces of the microcomputer system. A valuable handbook for self-study in learning microprocessors, for electrical engineers, electronic technicians, and all computer programmers.

Moral Misconduct (Flynn & Levy Book 1)


David DeLee - 2016
    You Can't Always Choose Your Partner.NYPD homicide detective Frank Flynn catches the worst case there is; a murdered police officer. Forced to team up with Internal Affairs investigator Christine Levy, they must get past their differences and learn to work together, and more importantly, trust each other, if they're to solve a cop's brutal murder, put a stop to an illegal child adoption ring, and expose a forfeiture asset scheme involving a group of corrupt NYPD cops willing to kill to keep their secrets.The first in an exciting new series from David DeLee, author of the award-winning Grace deHaviland Bounty Hunter series.The Flynn & Levy Series (in chronological order):Moral Misconduct * While the City Burns

Ash Vengeance (Wexler Vigilante Book 1)


Samson Weld - 2019
     Ash Wexler was a mild-mannered insurance adjuster before his wife and kids were brutally murdered. Before he was shot and left for dead. That was ruthless drug lord Osorio's only mistake, because now Ash has nothing left to lose. Having spent five years recuperating and training in martial arts as well as firearms, Ash follows Osorio to Dallas with only one mission: to take down Osorio's entire operation, one man at a time. With Detective Anna Bellucci tracking him down, Ash will need to be careful. He wants justice. He wants vengeance. He wants to kill every last one of them. Features coarse language and graphic violence

The Fourth Horseman (Sage Country)


Dan Arnold - 2018
    After Texas won its independence, the Mexican people left stranded on the U.S. side of the Rio Grande continue to live as they have for centuries. Not even the Civil War and Reconstruction have changed their way of life. Politics and greed are about to put an end to all that, even if it means murder. Outraged at being treated like second class citizens, the Mexican people have a different outcome in mind. They outnumber the Anglo population by ten to one. If they are to be treated like dogs, it's time for the dogs to bite. As blood flows on both sides of the conflict, an undercover Texas Ranger is sent into El Paso County to investigate. In a region where life is cheap and crime and corruption are as common as dirt, can one man find a just solution and prevent a war, or will death and hell ride into the borderlands on a pale horse? The Fourth Horseman is another great book for fans of Dan Arnold’s Historical Fiction. The story is based on one of the worst chapters in the history of Texas, the San Elizario Salt War. Fans of Louis L’ Amour will love this Western which may also remind them of Robert B. Parker or Elmore Leonard, with a touch of Cormac McCarthy for good measure.

Under the Banner of Heaven: A Story of Violent Faith by Jon Krakauer Summary & Study Guide


BookRags - 2011
    0 pages of chapter summaries, quotes, character analysis, themes, and more – everything you need to sharpen your knowledge of Under the Banner of Heaven: A Story of Violent Faith. This detailed literature summary also contains Topics for Discussion and a Free Quiz on Under the Banner of Heaven: A Story of Violent Faith by Jon Krakauer.

Digital Integrated Circuits


Jan M. Rabaey - 1995
    Digital Integrated Circuits maintains a consistent, logical flow of subject matter throughout. KEY TOPICS: Addresses today's most significant and compelling industry topics, including: the impact of interconnect, design for low power, issues in timing and clocking, design methodologies, and the tremendous effect of design automation on the digital design perspective. MARKET: For readers interested in digital circuit design.

Machine Learning: Fundamental Algorithms for Supervised and Unsupervised Learning With Real-World Applications


Joshua Chapmann - 2017
    Right?! Machine Learning is a branch of computer science that wants to stop programming computers using a detailed list of commands to follow blindly. Instead, their aim is to implement high-level routines that teach computers how to approach new and unknown problems – these are called algorithms. In practice, they want to give computers the ability to Learn and to Adapt. We can use these algorithms to obtain insights, recognize patterns and make predictions from data, images, sounds or videos we have never seen before – or even knew existed. Unfortunately, the true power and applications of today’s Machine Learning Algorithms remain deeply misunderstood by most people. Through this book I want fix this confusion, I want to shed light on the most relevant Machine Learning Algorithms used in the industry. I will show you exactly how each algorithm works, why it works and when you should use it. Supervised Learning Algorithms K-Nearest Neighbour Naïve Bayes Regressions Unsupervised Learning Algorithms: Support Vector Machines Neural Networks Decision Trees

Huntington House: A Mike Humber Detective Novel


R.R. Haywood - 2013
    they probably are.Huntington House: A Psychological sexy brutal twisting thriller that keeps you nailed to your seat.

Raising A Thief


Paul Podolsky - 2020
    

Exploring CQRS and Event Sourcing


Dominic Betts - 2012
    It presents a learning journey, not definitive guidance. It describes the experiences of a development team with no prior CQRS proficiency in building, deploying (to Windows Azure), and maintaining a sample real-world, complex, enterprise system to showcase various CQRS and ES concepts, challenges, and techniques.The development team did not work in isolation; we actively sought input from industry experts and from a wide group of advisors to ensure that the guidance is both detailed and practical.The CQRS pattern and event sourcing are not mere simplistic solutions to the problems associated with large-scale, distributed systems. By providing you with both a working application and written guidance, we expect you’ll be well prepared to embark on your own CQRS journey.

Shaded Heart (Downing Family Book 9)


Cassie Wild - 2019
    My heart ached for Sean when I learned his wife had been pregnant in the car explosion. But when I made the mistake of telling others about the fact, Sean flipped out and broke my heart. That’s when my ex contacted me and wanted to reunite. I was a hot mess and didn’t know which way to jump. Sean: I yelled at her…sweet Tish. I couldn’t believe I’d rained down my wrath on the one person I loved. But the fallout from what she did left me unhinged and I turned to the one thing I knew I could get lost in. Booze. Not a good move, to say the least. I was so screwed. The limits of love are tested for Sean and Tish in Shaded Heart, the newest installment in the steamy Irish Mafia romance saga, The Downing Family.

Across the Plains in 1884


Catherine Sager - 2016
    During it, both Henry and Naomi lost their lives and left their seven children orphaned. Later adopted by Marcus and Narcissa Whitman, missionaries in what is now Washington, they were orphaned a second time, when both their new parents were killed during the Whitman massacre in November 1847. About 1860 Catherine, the oldest girl, wrote a first-hand account of their journey across the plains and their life with the Whitmans. Today it is regarded as one of the most authentic accounts of the American westward migration.

Darknet: A Beginner's Guide to Staying Anonymous


Lance Henderson - 2012
    This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!

Quantum Computing Since Democritus


Scott Aaronson - 2013
    Full of insights, arguments and philosophical perspectives, the book covers an amazing array of topics. Beginning in antiquity with Democritus, it progresses through logic and set theory, computability and complexity theory, quantum computing, cryptography, the information content of quantum states and the interpretation of quantum mechanics. There are also extended discussions about time travel, Newcomb's Paradox, the anthropic principle and the views of Roger Penrose. Aaronson's informal style makes this fascinating book accessible to readers with scientific backgrounds, as well as students and researchers working in physics, computer science, mathematics and philosophy.