 |
|
 |  |  High Voltage Engineering FundamentalsThe first edition as well as its forerunner of Kuffel and Abdullah published in 1970 and their translations into Japanese and Chinese languages have enjoyed wide international acceptance as basic textbooks in teaching senior undergraduate and postgraduate courses in High-Voltage Engineering. Both texts have also been extensively used by practising... |  |  Elimination Practice: Software Tools and Applications (With CD-Rom)This book is a tresure … will be welcomed by all who are active in the areaof elimination methods. -- Bruno Buchberger Professor of Computer Mathematics Johannes Kepler University, Austria
With a software library included, this book provides an elementary introduction to polynomial elimination in practice.... |
|
 Sukhoi Su-27: Famous Russian AircraftIn the late 1960s, the Soviet Union became aware that the U.S. was developing a new generation of jet fighters that had an exceptional range, heavy armor, and great agility in the air. These U.S. aircraft, the F-14 Tomcat, F-15 Eagle, F-16 Fighting Hornet, and F/A-18 Hornet dominated U.S. air power for three decades. In the context of the Cold War,... |  |  PHP 6 Fast and Easy Web DevelopmentLearn to create Web pages quickly and easily with PHP—no prior programming experience required! PHP 6 Fast & Easy Web Development provides a step-by-step, learn-by-example path to learning through easy-to-understand language and illustrations. Unlike the verbose text-only chapters found in most programming books, the Fast & Easy Web... |  |  Finite Automata and Application to CryptographyFinite Automata and Application to Cryptography mainly deals with the invertibility theory of finite automata and its application to cryptography. In addition, autonomous finite automata and Latin arrays, which are relative to the canonical form for one-key cryptosystems based on finite automata, are also discussed.
Finite automata are... |
|
 Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |  |  |  |  Beginning Joomla!, Second Edition (Beginning from Novice to Professional)Joomla!, exclamation point and all, is one of the most searched–for and hired–for open source content management systems in the world. Since 2007, the combination of Joomla! and Dan Rahmel’s bestselling Beginning Joomla!, From Novice to Professional have made it so that all you have to do is read a single... |
|
|
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |