Home | Amazing | Today | Tags | Publishers | Years | Search 
Reconstruction Designs of Lost Ancient Chinese Machinery (History of Mechanism and Machine Science)
Reconstruction Designs of Lost Ancient Chinese Machinery (History of Mechanism and Machine Science)
This book presents an innovative approach for the reconstruction design of lost ancient Chinese machinery. By combining the creative mechanism design methodology with the mechanical evolution and variation theory, all feasible and appropriate designs that are consistent with the science theories and techniques of the subject’s time period can...
The Liberal Project and Human Rights: The Theory and Practice of a New World Order
The Liberal Project and Human Rights: The Theory and Practice of a New World Order
"Liberalism, assailed from all sides in the great political and legal debates of our time, is defended staunchly and deftly in this expansive and sensitive book. Charvet and Kaczynska-Nay combine their talents as political theorist and international lawyer, respectively, to produce a meticulous account of a human rights order embedded in the...
IP for 3G: Networking Technologies for Mobile Communications
IP for 3G: Networking Technologies for Mobile Communications

What is an 'all-IP' network? What difference will IP networking make to 3G services?

Third Generation (3G) mobile offers access to broadband multimedia services - and in the future most of these, even voice and video, will be IP-based. However 3G networks are not based on IP technologies, rather they are an evolution from existing 2G...

Wireless Communications Research Trends
Wireless Communications Research Trends
The scope of this new and important book includes: personal portable telephones, multimedia devices, digital assistants, and communicating palmtop computers; registration and handoff protocols, messaging, and communications and computing requirements; network control and management for protocols associated with routing and tracking of mobile users;...
Computer Viruses and Other Malicious Software:  A Threat to the Internet Economy
Computer Viruses and Other Malicious Software: A Threat to the Internet Economy
Malware attacks are increasing both in frequency and sophistication, thus posing a serious threat to the Internet economy and to national security. This book is a first step toward addressing the threat of malware in a comprehensive, global manner. It informs readers about malware -- its growth, evolution and countermeasures to combat it; presents...
Constructive Modeling Of Structural Turbulence And Hydrodynamic Instabilities
Constructive Modeling Of Structural Turbulence And Hydrodynamic Instabilities
The book provides an original approach in the research of structural analysis of free developed shear compressible turbulence at high Reynolds number on the base of direct numerical simulation (DNS) and instability evolution for ideal medium (integral conservation laws) with approximate mechanism of dissipation (FLUX dissipative monotone...
Beautiful Security: Leading Security Experts Explain How They Think
Beautiful Security: Leading Security Experts Explain How They Think
In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Modern Mathematics in the Light of the Fields Medal
Modern Mathematics in the Light of the Fields Medal
Examines the evolution of certain areas of modern mathematics by recounting the past winners of the international Fields Medal, the - Nobel Prize - of mathematics. Paper. DLC: Mathematics - History 20th century.

This little book is extraordinary in at least three ways. First, it contains in only 150 pages a synopsis of the whole
...
Where Men Hide
Where Men Hide
"If you ask men if they spend any time hiding, they usually look at you as if you're nuts. 'What, me hide?' But if you ask women whether men hide, they immediately know what you mean." -- from Where Men Hide

Where Men Hide is a spirited tour of the dark and often dirty places men go to find comfort, camaraderie,...

Flash with Drupal
Flash with Drupal
Due to its power and expandability, Drupal has become one of the most popular open source content management systems. At the same time, Flash has been adopted for its ability to create beautiful and dynamic web applications. By combining these technologies, you can create Flash applications that are both visually stunning and rich in content....
Vintage Games: An Insider Look at the History of Grand Theft Auto, Super Mario, and the Most Influential Games of All Time
Vintage Games: An Insider Look at the History of Grand Theft Auto, Super Mario, and the Most Influential Games of All Time

Vintage Games explores the most influential videogames of all time, including Super Mario Bros., Grand Theft Auto III, Doom, The Sims and many more. Drawing on interviews as well as the authors' own lifelong experience with videogames, the book discusses each game's development, predecessors, critical reception, and influence on the industry. It...

A Guide to the Wireless Engineering Body of Knowledge (WEBOK)
A Guide to the Wireless Engineering Body of Knowledge (WEBOK)
The ultimate reference book for professionals in the wireless industry

The information presented in this book reflects the evolution of wireless technologies, their impact on the profession, and the industry's commonly accepted best practices. Organized into seven main areas of expertise, A Guide to the Wireless...

Result Page: 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy