Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Laser Surface Modification and Adhesion (Adhesion and Adhesives: Fundamental and Applied Aspects)
Laser Surface Modification and Adhesion (Adhesion and Adhesives: Fundamental and Applied Aspects)

The book provides a unique overview on laser techniques and applications for the purpose of improving adhesion by altering surface chemistry and topography/morphology of the substrate. It details laser surface modification techniques for a wide range of industrially relevant materials (plastics, metals, ceramics, composites) with the aim to...

Environmental Hazards and Disasters: Contexts, Perspectives and Management
Environmental Hazards and Disasters: Contexts, Perspectives and Management

Environmental Hazards and Disasters: Contexts, Perspectives and Management focuses on manifested threats to humans and their welfare as a result of natural disasters. The book uses an integrative approach to address socio-cultural, political and physical components of the disaster process. Human and social vulnerability as well as risk...

The Data Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business
The Data Bonanza: Improving Knowledge Discovery in Science, Engineering, and Business

Complete guidance for mastering the tools and techniques of the digital revolution

With the digital revolution opening up tremendous opportunities in many fields, there is a growing need for skilled professionals who can develop data-intensive systems and extract information and knowledge from them. This book frames for the...

Threat Modeling: Designing for Security
Threat Modeling: Designing for Security

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he
...

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation

Analyzing how hacks are done, so as to stop them in the future

Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys...

Innovation in Wind Turbine Design
Innovation in Wind Turbine Design

Innovation in Wind Turbine Design addresses the fundamentals of design, the reasons behind design choices, and describes the methodology for evaluating innovative systems and components. Always referencing a state of the art system for comparison, Jamieson discusses the basics of wind turbine theory and design, as well as how to apply...

Game Theory: An Introduction
Game Theory: An Introduction

An exciting new edition of the popular introduction to game theory and its applications

The thoroughly expanded Second Edition presents a unique, hands-on approach to game theory. While most books on the subject are too abstract or too basic for mathematicians, Game Theory: An Introduction, Second...

Asymmetric Synthesis of Natural Products
Asymmetric Synthesis of Natural Products

Asymmetric Synthesis of Natural Products, 2nd Edition introduces students to this rapidly growing field of organic chemistry. The initial chapters present the foundations of asymmetric synthesis, including the theory and applications of individual asymmetric reactions. This is followed by chapters on each of the major individual...

Tidal Power: Harnessing Energy from Water Currents
Tidal Power: Harnessing Energy from Water Currents

As the global supply of conventional energy sources, such as fossil fuels, dwindles and becomes more and more expensive, unconventional and renewable sources of energy, such as power generation from water sources, is becoming more and more important.  Hydropower has been around for decades, but this book suggests new methods that are...

Frequency-Domain Analysis and Design of Distributed Control Systems
Frequency-Domain Analysis and Design of Distributed Control Systems

This book presents a unified frequency-domain method for the analysis of distributed control systems. The following important topics are discussed by using the proposed frequency-domain method: (1) Scalable stability criteria of networks of distributed control systems; (2) Effect of heterogeneous delays on the stability of a network of...

Unmasking the Social Engineer: The Human Element of Security
Unmasking the Social Engineer: The Human Element of Security

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and...

Investing in the High Yield Municipal Market: How to Profit from the Current Municipal Credit Crisis and Earn Attractive Tax-Exempt Interest Income
Investing in the High Yield Municipal Market: How to Profit from the Current Municipal Credit Crisis and Earn Attractive Tax-Exempt Interest Income

A practical guide to profiting from the high yield municipal market

This unique guide to the high yield municipal bond market sheds some much-needed light on this esoteric but profitable corner of the fixed-income world. It fills the void between the general reference handbooks on municipal bonds and the superficial...

unlimited object storage image
Result Page: 318 317 316 315 314 313 312 311 310 309 308 307 306 305 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy