|
|
|
|
|
Computer Simulation of Shaped Charge ProblemsDevoted to the subject of shape charge design using numerical methods, this book offers the defense and commercial industries unique material not contained in any other single volume. The coverage of the Lagrangian and Eulerian methods as well as the equation of state provides first hand help to engineers working on shape charge problems. The book... | | | | Oracle DBA on UNIX and Linux (Kaleidoscope)Oracle DBA on Unix and Linux provides all the information needed to install, support, tune, and upgrade Oracle databases on the UNIX and Linux platforms. Maintain a robust, mission-critical Oracle8i database. This book provides administrative solutions for the day-to-day DBA. You'll learn how to install the database for maximum efficiency,... |
|
Bridge For Dummies
Bridge, as any player will tell you, is simply the best card game ever. It’s challenging—each hand presents a different set of conditions you must figure out and solve. It's very social—you play with a partner and two opponents. And best of all—it's fun.
Bridge For Dummies, 2E gives you a... | | Fundamentals of Sensor Network Programming: Applications and Technology
Sensor processing is a central and an important problem in aerospace/defense, automation,
medical imaging, and robotics, to name only a few areas. A surveillance
system used in aerospace and defense is an example of a sensor processing system.
It uses devices such as infrared sensors, microwave radars, and laser radars that are... | | Disinfection and Decontamination: Principles, Applications and Related Issues
In the battle between humans and microbes, knowledge may be not only the best weapon but also the best defense. Pulling contributions from 34 experts into a unified presentation, Disinfection and Decontamination: Principles, Applications, and Related Issues provides coverage that is both sophisticated and practical. The book reviews... |
|
Security Power ToolsWhat if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security... | | | | Investigative Data Mining for Security and Criminal Detection, First EditionInvestigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest... |
|
|
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |