|
|
A Primer for Mathematics CompetitionsThe importance of mathematics competitions has been widely recognized for three reasons: they help to develop imaginative capacity and thinking skills whose value far transcends mathematics; they constitute the most effective way of discovering and nurturing mathematical talent; and they provide a means to combat the prevalent false image of... | | Damage and Failure of Composite Materials
Understanding damage and failure of composite materials is critical for reliable and cost-effective engineering design. Bringing together materials mechanics and modeling, this book provides a complete guide to damage, fatigue and failure of composite materials. Early chapters focus on the underlying principles governing composite damage,... | | The $1 Million Reason to Change Your Mind
What is the $1 million reason to change your mind?
Change the way you think and you will change your world. Simple.
In this book Pat Mesiti will teach you how to shrug off the shackles of mediocrity, find your inner millionaire and think differently about life and money -- and get rich and happy along the way! ... |
|
Monitoring with Ganglia
In 1999, I packed everything I owned into my car for a cross-country trip to begin my
new job as Staff Researcher at the University of California, Berkeley Computer Science
Department. It was an optimistic time in my life and the country in general. The economy
was well into the dot-com boom and still a few years ... | | Corrosion Prevention and Protection: Practical Solutions
There are many books and monographs on corrosion, such as Corrosion and Corrosion Control by H. H. Uhlig and R. W. Revie; Corrosion Engineering by M. G. Fontana and N. D. Greene; Principles and Prevention of Corrosion by D. A. Jones; An Introduction to Corrosion and Protection of Metals by G. Wranglen; and Corrosion for Science and... | | Computer Security Fundamentals (2nd Edition)
It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.
The real question is who is this book for. This book is... |
|
|
|
Result Page: 5 4 3 2 1 |