Home | Amazing | Today | Tags | Publishers | Years | Search 
Engineering Noise Control: Theory and Practice
Engineering Noise Control: Theory and Practice

The third edition of Engineering Noise Control has been thoroughly revised, updated and extended. Each chapter contains new material, much of which is not available elsewhere. The result is a comprehensive discussion of the theoretical principles and concepts of acoustics and noise control, a detailed discussion of the hearing...

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

This book is designed to cover the strategic, operational, and tactical aspects of the conflicts in cyberspace today. The perspectives of the two authors balance the viewpoints of what many are calling cyber warfare today. One comes from a commercial background and the other brings the military viewpoint. The book is designed to help...

Chemical Engineering Volume 2, Fifth Edition (Chemical Engineering Series)
Chemical Engineering Volume 2, Fifth Edition (Chemical Engineering Series)

Chemical Engineering Volume 2 covers the properties of particulate systems, including the character of individual particles and their behaviour in fluids. Sedimentation of particles, both singly and at high concentrations, flow in packed and fluidised beads and filtration are then examined. The latter part of the book deals with separation...

Air Quality Assessment & Management
Air Quality Assessment & Management

This book primarily describes how to undertake air quality assessment and management studies at the project level, and therefore details basic concepts, techniques, methodologies and practices.

The book reviews the principles of air quality assessment and management; primary sources of air pollution; air pollution effects on...

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)
PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks (Networking Technology: Security)

With the increasing focus on IT Security comes a higher demand for identity management in the modern business. This requires a flexible, scalable, and secure authentication method. Identity control is made mandatory by many public standards, such as PCI, and PKI is an essential component to set up authentication in many technologies,...

Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)
Computers and Intractability: A Guide to the Theory of NP-Completeness (Series of Books in the Mathematical Sciences)

Few technical lerms have gained such rapid notoriety as the appela tion "NP-complete." In the short lime since its introduction in the early 1970's, this term has come to symbolize the abyss of inherent intractability that algorithm designers increasingly face as they seek to solve larger and more complex problems. A...

The Multiplayer Classroom: Designing Coursework as a Game
The Multiplayer Classroom: Designing Coursework as a Game

Discover how to engage your students and raise their grades and attendance in your classroom. THE MULTIPLAYER CLASSROOM: DESIGNING COURSEWORK AS A GAME is your detailed guide to designing any structured learning experience as a game. Written for professional educators or those learning to be educators, here are the tools to engage and excite...

Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment
Bridging Scales and Knowledge Systems: Concepts and Applications in Ecosystem Assessment

The Millennium Ecosystem Assessment (MA) was carried out between 2001 and 2005 to assess the consequences of ecosystem change for human well-being and to establish the basis for actions needed to enhance the conservation and sustainable use of ecosystems and their contributions to human well-being. The MA was originally conceived as a...

Principles of Communications Networks and Systems
Principles of Communications Networks and Systems

This book addresses the fundamentals of communications systems and networks, providing models and analytical methods for evaluating their performance. It is divided into ten chapters, which are the result of a joint effort by the authors and contributors. The authors and the contributors have a long history of collaboration, both in...

Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China
Theory and Applications of Models of Computation: Third International Conference, TAMC 2006, Beijing, China

In several practical circumstances we have to solve a problem whose instance is not a priori completely known. Situations of this kind occur in computer systems and networks management, in financial decision making, in robotics etc. Problems that have to be solved without a complete knowledge of the instance are called on-line...

Comprehensive Enzyme Kinetics
Comprehensive Enzyme Kinetics

Welcome to your study of enzyme kinetics, the subject that underlies all enzymology, which in turn underlies all aspects of biochemistry. This text will give you an introduction to a wide range of topics that constitute the modern enzyme kinetics. This textbook is directed at graduate students in biochemistry, chemistry, and life sciences,...

Build Your Own ASP.NET Website Using C# & VB.NET
Build Your Own ASP.NET Website Using C# & VB.NET

A tutorial style book for absolute beginners that walks readers through an introduction to databases and programming concepts and then shows them how to build practical applications using Microsoft's technology.

Build Your Own ASP.NET Website Using C# & VB.NET guides readers through obtaining, installing...

Result Page: 543 542 541 540 539 538 537 536 535 534 533 532 531 530 529 528 527 526 525 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy