Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fundamentals of Engineering Electromagnetics

Buy

Fundamental of Engineering Electromagnetics not only presents the fundamentals of electromagnetism in a concise and logical manner, but also includes a variety of interesting and important applications. While adapted from his popular and more extensive work, Field and Wave Electromagnetics, this text incorporates a number of innovative pedagogical features. Each chapter begins with an overview which serves to offer qualitative guidance to the subject matter and motivate the student. Review questions and worked examples throughout each chapter reinforce the student's understanding of the material. Remarks boxes following the review questions and margin notes throughout the book serve as additional pedagogical aids.

(HTML tags aren't allowed.)

Beginning 3D Game Programming
Beginning 3D Game Programming
There are many programming hobbyists who write 2D games but there are far fewer that grasp the concepts of 3D programming. Although there are also quite a few "game development" books on the market, few deal with 3D game development. Those that do are mainly aimed at advanced readers. This book will provide a practical, example driven...
Transitions in Nursing: Preparing for Professional Practice, 3e
Transitions in Nursing: Preparing for Professional Practice, 3e

New edition of the essential text for senior nursing students transitioning to professional nursing practice.

Now in its third edition, the popular Transitions in Nursing continues to recognise the issues and challenges faced by senior students making the transition to nursing practice.

Transitions in...

Managing Information Security
Managing Information Security

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth...


Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
Developing and Implementing Windows®-based Applications with Visual Basic® .NET and Visual Studio® .NET Exam Cram™ 2 (Exam 70-306)
Developing and Implementing Windows®-based Applications with Visual Basic® .NET and Visual Studio® .NET Exam Cram™ 2 (Exam 70-306)

This certification exam measures the ability to develop and implement Windows-based applications by using Windows Forms and the Microsoft .NET Framework. This exam counts as a core credit toward the new MCAD (Microsoft Certified Application Developer) certification as well as a core credit toward the MCSD certification for...

Linear Circuit Design Handbook
Linear Circuit Design Handbook
This work is based on the work of many other individuals who have been involved with applications and Analog Devices since the company started in 1965. Much of the material that appears in this work is based on work that has appeared in other forms. My major job function in this case was one of editor. The list of people I would like to credit for...
©2020 LearnIT (support@pdfchm.net) - Privacy Policy