Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Urban Aerodynamics: Wind Engineering for Urban Planners and Designers
Urban Aerodynamics: Wind Engineering for Urban Planners and Designers

Prepared by the Task Committee on Urban Aerodynamics of the Environmental Wind Engineering Committee of the Technical Council on Wind Engineering of ASCE. Urban Aerodynamics: Wind Engineering for Urban Planners and Designers introduces the basic tools and technology used by engineers to determine the effects of wind on city streets and...

Asianization of Migrant Workers in the Gulf Countries
Asianization of Migrant Workers in the Gulf Countries

This edited volume contains sixteen chapters by eminent scholars on one of the largest migration corridors in the world i.e., between South and South-East Asia and the Gulf region. Asia’s trade and cultural contact with the Gulf date back to ancient historical times. Since the 1970s, the economic rise of the Gulf Cooperation...

Enterprise Systems Education in the 21st Century
Enterprise Systems Education in the 21st Century
IT education, particularly at business colleges, is undergoing a transformation because of the emerging federated systems or enterprise-wide systems (ES). This follows a trend in industry, which uses complex software applications like SAP and others. This movement toward ES in industry has created major challenges for integrating ES into the...
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
How Do I Save My Honor?: War, Moral Integrity, and Principled Resignation
"A fascinating and urgently needed exploration of moral responsibility in wartime, focusing on the complex realities and demands since 9/11. This engagingly written and well-researched study challenges each of us to honor our better selves." --Richard Falk, University of California, Santa Barbara

"Felice has written the
...
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security)

The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government’s National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world’s most important block cipher. In...

Crossing the Energy Divide: Moving from Fossil Fuel Dependence to a Clean-Energy Future
Crossing the Energy Divide: Moving from Fossil Fuel Dependence to a Clean-Energy Future

Praise for Crossing the Energy Divide

 

“This book makes coherent and rigorous arguments that increasing energy efficiency is the primary driver of economic growth today and is key to managing climate change.”

...
Principles of Lasers
Principles of Lasers

This new Fourth Edition of Principles of Lasers is so thoroughly updated and expanded that it is virtually a whole new book. But the text’s essential mission remains the same: to provide a wide-ranging yet unified description of laser behavior, physics, technology, and current applications. Dr. Svelto emphasizes the physical...

Voice over Internet Protocol (VoIP) Security
Voice over Internet Protocol (VoIP) Security
"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M....
The JOBS Act: Crowdfunding for Small Businesses and Startups
The JOBS Act: Crowdfunding for Small Businesses and Startups

Social media is one of the most remarkable developments of the Internet revolution. One need look no further than Egypt, the United Kingdom, the United States, Syria, or Libya to view the influence that online communities have had in the political sphere. Now, this power has come to the business world, specifically the marketplace for equity...

Wireless and Mobile All-IP Networks
Wireless and Mobile All-IP Networks
Here's your all-IP network handbook for 3G and beyond

Experts forecast a future in which all telephone services will be delivered over the economical, efficient IP network. In this follow-up to Wireless and Mobile Network Architecture, the bestselling guide to wireless network engineering, Yi-Bing Lin and Ai-Chun Pang delve...

Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Global IPv6 Strategies: From Business Analysis to Operational Planning (Network Business)
Every year, organizations rely on Internet applications and services more deeply–and every year, Internet infrastructure grows more powerful and complex. As the limitations of traditional IPv4 addressing become increasingly apparent, many decision makers recognize that a transition to IPv6 is needed far sooner than anticipated. Global...
Vatican assassins: "wounded in the house of my friends"
Vatican assassins: "wounded in the house of my friends"
Eric Jon Phelps gives the past and present diabolical history of the Society of Jesus. Its Second Thirty Years' War (1914-1945), including the Jewish, Lutheran, Orthodox and Buddhist Holocausts, was vengeance for the Order's expulsion from Europe and Asia during the Nineteenth Century.

Its Cold War was the coninuation of the killing of
...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy