Home | Amazing | Today | Tags | Publishers | Years | Search 
How Does One Cut a Triangle?
How Does One Cut a Triangle?

How Does One Cut a Triangle? is a work of art, and rarely, perhaps never, does one find the talents of an artist better suited to his intention than we find in Alexander Soifer and this book.       

—Peter D. Johnson, Jr.

This delightful book considers and solves many problems in dividing...

Fault Location on Power Networks (Power Systems)
Fault Location on Power Networks (Power Systems)

Electric power systems will always be exposed to the failure of their components. When a fault occurs on a line, it is crucial for the fault location to be identified as accurately as possible, allowing the damage caused by the fault to be repaired quickly before the line is put back into service. Fault Location on Power Lines enables...

The Last Days of Las Vegas
The Last Days of Las Vegas
"The Last Days of Las Vegas" has been provided by its author, Roy Hayes, especially for PDFCHM.

“Cryptic as they come, with layers of mystery unfolding gradually, this new spy thriller is really something different: a chess puzzle that teases and  entices you on, with loads of action and appropriate amounts of sex.
...
Designing Steel Structures for Fire Safety
Designing Steel Structures for Fire Safety

Structural design in fire conditions is conceptually similar to structural design in normal temperature conditions, but often more difficult because of internal forces induced by thermal expansion, strength reduction due to elevated temperatures, much larger deflections, and numerous other factors. Before making any design decisions it is...

Hacking Exposed Malware & Rootkits
Hacking Exposed Malware & Rootkits

Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...

jQuery UI 1.7: The User Interface Library for jQuery
jQuery UI 1.7: The User Interface Library for jQuery
Modern web application user interface design requires rapid development and proven results. jQuery UI, a trusted suite of official plugins for the jQuery JavaScript library, gives you a solid platform on which to build rich and engaging interfaces with maximum compatibility, stability, and a minimum of time and effort.

jQuery UI has a
...
The Extracted MBA: A Topical Reference for the Contemporary MBA
The Extracted MBA: A Topical Reference for the Contemporary MBA
The Extracted MBA represents the culmination of a decade's worth of undergraduate and graduate study, as well my practical management experiences, both in my work and in the courses I teach. Upon being awarded my MBA in 1998, I searched for a book that could concisely provide a reference, a recap if you will, of what I had learned in my years of...
Windows NT File System Internals : A Developer's Guide
Windows NT File System Internals : A Developer's Guide
Writing kernel-mode Windows NT programs--such as file-system drivers (FSDs), filter drivers, and antivirus programs--poses a challenge to even experienced Windows programmers. It's hard enough to get these programs to work, but getting them to live peacefully with other kernel programs and NT itself is an art. Nagar sorts through the mechanics...
Signals and Systems with MATLAB
Signals and Systems with MATLAB
The fully comprehensive text covers most of the theoretical foundations and mathematical derivations that will be used in higher-level related subjects such as signal processing, communication, and control, minimizing the mathematical difficulty and computational burden.

Complying actively with the requirement by ABET (Accreditation Board for...

CompTIA Network+ Certification Study Guide, Fourth Edition (Certification Press)
CompTIA Network+ Certification Study Guide, Fourth Edition (Certification Press)
If you are new to certifications, we have some good news and some bad news. The good news is that a computer industry certification is one of the most valuable credentials you can earn. It sets you apart from the crowd and marks you as a valuable asset to your employer. You will gain the respect of your peers, and certification can have a...
How to Do Everything Genealogy
How to Do Everything Genealogy
Family is forever! That is a lesson I learned at the age of ten when my aunt and grandmother exposed me with pride in our family history. Their stories and enthusiasm sparked an interest in me to explore and learn more on my own. From that day forward, history and geography were no longer just names, dates, and places. They became the world stage...
Hacking: The Next Generation (Animal Guide)
Hacking: The Next Generation (Animal Guide)
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the...
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy