Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Computer Engineering Handbook (Electrical Engineering Handbook)
The Computer Engineering Handbook (Electrical Engineering Handbook)

There is arguably no field in greater need of a comprehensive handbook than computer engineering. Under the leadership of Vojin Oklobdzija and a stellar editorial board, some of the industry's foremost experts have joined forces to create what promises to be the definitive resource for computer design and engineering. Instead of focusing on...

ATM Technology for Broadband Telecommunications Networks
ATM Technology for Broadband Telecommunications Networks
This textbook presents all the latest information on all aspects of each important component of ATM - the hottest telecommunications technology of this decade. It demonstrates how ATM internetworks several incompatible telecommunications technologies and provide the high-speed, high bandwidth backbone network that the entire telecom industry is...
Handbook of Lasers
Handbook of Lasers
Lasers continue to be an amazingly robust field of activity, one of continually expanding scientific and technological frontiers. Thus today we have lasing without inversion, quantum cascade lasers, lasing in strongly scattering media, lasing in biomaterials, lasing in photonic crystals, a single atom laser, speculation about black hole lasers,...
Six Sigma and Beyond: Statistical Process Control, Volume IV
Six Sigma and Beyond: Statistical Process Control, Volume IV
This guide introduces the statistical process control (SPC) methodology for collecting data, arranging data in a chart or graph form, and interpreting the data to reduce variations in the process.

Features

  • Provides an overview of SPC in very simple, easily understood terms
  • Reviews and explains traditional...
Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

Biomechanical Systems: Techniques and Applications, Volume III:  Musculoskeletal Models and Techniques
Biomechanical Systems: Techniques and Applications, Volume III: Musculoskeletal Models and Techniques
Because of rapid developments in computer technology and computational techniques, advances in a wide spectrum of technologies, and other advances coupled with cross-disciplinary pursuits between technology and its applications to human body processes, the field of biomechanics continues to evolve. Many areas of significant progress can be noted....
Uncertainty Quantification in Laminated Composites: A Meta-model Based Approach
Uncertainty Quantification in Laminated Composites: A Meta-model Based Approach

Over the last few decades, uncertainty quantification in composite materials and structures has gained a lot of attention from the research community as a result of industrial requirements. This book presents computationally efficient uncertainty quantification schemes following meta-model-based approaches for stochasticity in...

Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)
Cryptography: Theory and Practice (Discrete Mathematics and Its Applications)

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general...

Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21
Distributed Multimedia Database Technologies Supported by MPEG-7 and MPEG-21

A multimedia system needs a mechanism to communicate with its environment, the Internet, clients, and applications. MPEG-7 provides a standard metadata format for global communication, but lacks the framework to let the various players in a system interact. MPEG-21 closes this gap by establishing an infrastructure for a distributed multimedia...

Introduction to Forensic Sciences, Second Edition
Introduction to Forensic Sciences, Second Edition
This work is dedicated to students at all levels of education, who are interested
in the fascinating field of forensic science. The contents of this book, by
outstanding contributors, provides the reader with information on the various
fields of forensic science that may help them make a career choice or
add to their present
...
Forensic Engineering Investigation
Forensic Engineering Investigation
Forensic engineering is the application of engineering principles, knowledge,
skills, and methodologies to answer questions of fact that may have legal
ramifications. Forensic engineers typically are called upon to analyze car
accidents, building collapses, fires, explosions, industrial accidents, and various
calamities
...
A Practical Approach to WBEM/CIM Management
A Practical Approach to WBEM/CIM Management

System architects and engineers in fields such as storage networking, desktop computing, electrical power distribution, and telecommunications need a common and flexible way of managing heterogeneous devices and services. Web-Based Enterprise Management WBEM and its Component Information Model (CIM) provide the architecture, language,...

Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy