| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910457334203321 |
|
|
Titolo |
Op Amp applications handbook [[electronic resource] /] / Walt Jung, editor ; with the technical staff of Analog Devices |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Burlington, MA, : Newnes, c2005 |
|
|
|
|
|
|
|
ISBN |
|
1-281-02017-6 |
9781417552727 |
9786611020170 |
0-08-049199-5 |
|
|
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (897 p.) |
|
|
|
|
|
|
Collana |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Operational amplifiers |
Amplifiers (Electronics) |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Op Amp Applications Handbook; Copyright Page; Contents; Foreword; Preface; Acknowledgments; Op Amp History Highlights; Chapter 1. Op Amp Basics; Section 1-1: Introduction; Section 1-2: Op Amp Topologies; Section 1-3: Op Amp Structures; Section 1-4: Op Amp Specifications; Section 1-5: Precision Op Amps; Section 1-6: High Speed Op Amps; Chapter 2. Specialty Amplifiers; Section 2-1: Instrumentation Amplifiers; Section 2-2: Programmable Gain Amplifiers; Section 2-3: Isolation Amplifiers; Chapter 3. Using Op Amps with Data Converters; Section 3-1: Introduction |
Section 3-2: ADC/DAC SpecificationsSection 3-3: Driving ADC Inputs; Section 3-4: Driving ADC/DAC Reference Inputs; Section 3-5: Buffering DAC Outputs; Chapter 4. Sensor Signal Conditioning; Section 4-1: Introduction; Section 4-2: Bridge Circuits; Section 4-3: Strain, Force, Pressure and Flow Measurements; Section 4-4: High Impedance Sensors; Section 4-5: Temperature Sensors; Chapter 5. Analog Filters; Section 5-1: Introduction; Section 5-2: The Transfer Function; Section 5-3: Time Domain Response; Section 5-4: Standard Responses; Section 5-5: Frequency Transformations |
|
|
|
|
|
|
|
|
|
|
|
Section 5-6: Filter RealizationsSection 5-7: Practical Problems in Filter Implementation; Section 5-8: Design Examples; Chapter 6. Signal Amplifiers; Section 6-1: Audio Amplifiers; Section 6-2: Buffer Amplifiers and Driving Capacitive Loads; Section 6-3: Video Amplifiers; Section 6-4: Communication Amplifiers; Section 6-5: Amplifier Ideas; Section 6-6: Composite Amplifiers; Chapter 7. Hardware and Housekeeping Techniques; Section 7-1: Passive Components; Section 7-2: PCB Design Issues; Section 7-3: Op Amp Power Supply Systems; Section 7-4: Op Amp Protection |
Section 7-5: Thermal ConsiderationsSection 7-6: EMI/RFI Considerations; Section 7-7: Simulation, Breadboarding and Prototyping; Chapter 8. Op Amp History; Section 8-1: Introduction; Section 8-2: Vacuum Tube Op Amps; Section 8-3: Solid-State Modularand Hybrid Op Amps; Section 8-4: IC Op Amps; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
Operational amplifiers play a vital role in modern electronics design. The latest op amps have powerful new features, making them more suitable for use in many products requiring weak signal amplification, such as medical devices, communications technology, optical networks, and sensor interfacing. The Op Amp Applications Handbook may well be the ultimate op amp reference book available. This book is brimming with up-to-date application circuits, valuable design tips, and in-depth coverage of the latest techniques to simplify op amp circuit designs, and improve their performance. As an |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910458892303321 |
|
|
Autore |
Thuraisingham Bhavani M. |
|
|
Titolo |
Secure semantic service-oriented systems / / Bhavani Thuraisingham |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Boca Raton, Fla. : , : CRC Press, , 2011 |
|
|
|
|
|
|
|
ISBN |
|
0-429-24963-2 |
1-4200-7332-X |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (446 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Service-oriented architecture (Computer science) |
Computer networks - Security measures |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Front Cover; Contents; Preface; Acknowledgments; Chapter 1: Introduction; Chapter 2: Service-Oriented Computing; Chapter 3: SOA and Web Services; Chapter 4: Service-Oriented Analysis and Design; Chapter 5: Specialized Web Services; Chapter 6: Semantic Web Services; Chapter 7: Trustworthy Systems; Chapter 8: Secure Service-Oriented Computing; Chapter 9: Secure SOA and Web Services; Chapter 10: Secure Service-Oriented Analysis and Design; Chapter 11: Access Control for Web Services; Chapter 12: Digital Identity Management; Chapter 13: Security Models for Web Services |
Chapter 14: Trust Management and Web ServicesChapter 15: Privacy and Web Services; Chapter 16: Integrity Management, Data Provenance, and Web Services; Chapter 17: Secure Semantic Web and Web Services; Chapter 18: Security, XML, and Web Services; Chapter 19: Security, RDF, and Web Services; Chapter 20: Security, Ontologies, and Web Services; Chapter 21: Security, Rules, and Web Services; Chapter 22: Web Services for Secure Data, Information, and Knowledge Management; Chapter 23: Secure Geospatial, Multimedia, and Sensor Web Services; Chapter 24: Web Services for Secure Activity Management |
Chapter 25: Secure Specialized Web ServicesChapter 26: Summary and Directions; Appendix A: Data Management Systems: Developments and Trends; Appendix B: Database Management; Appendix C: Secure |
|
|
|
|
|
|
|
|
|
|
|
Objects; Appendix D: Developments with Standards, Products, and Tools; Back Cover |
|
|
|
|
|
|
Sommario/riassunto |
|
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications, and information systems. In order to effectively protect this data against evolving threats, an up-to-date understanding of the mechanisms for securing semantic Web technologies is essential. Reviewing cutting-edge developments, Secure Semantic Service-Oriented Systems focuses on confidentiality, privacy, trust, and integrity management for Web services. It demonstrates the breadth and depth of applications of these te |
|
|
|
|
|
|
|
| |