Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Essential MATLAB for Scientists and Engineers
Essential MATLAB for Scientists and Engineers
Based on a teach-yourself approach, the fundamentals of MATLAB are illustrated throughout with many examples from a number of different scientific and engineering areas, such as simulation, population modelling, and numerical methods, as well as from business and everyday life. Some of the examples draw on first-year university level maths, but...
Progress in Life Cycle Assessment 2019 (Sustainable Production, Life Cycle Engineering and Management)
Progress in Life Cycle Assessment 2019 (Sustainable Production, Life Cycle Engineering and Management)

This book covers the latest developments in life cycle assessment LCA both in terms of methodology and its application in various research areas. It includes methodological questions as well as case studies concerning energy and mobility, materials and engineering, sustainable construction and future technologies. With numerous...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Vector and Tensor Analysis with Applications
Vector and Tensor Analysis with Applications

Definition of vectors and discussion of algebraic operations on vectors leads to concept of tensor and algebraic operations on tensors. Also, systematic study of the differential and integral calculus of vector and tensor functions of space and time, more. Concise, eminently readable text. Worked out problems, solutions.

The...

Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day
Soldier, Sailor, Frogman, Spy, Airman, Gangster, Kill or Die: How the Allies Won on D-Day

A ground-breaking account of the first 24 hours of the D-Day invasion told by a symphony of incredible accounts of unknown and unheralded members of the Allied – and Axis – forces.

An epic battle that involved 156,000 men, 7,000 ships and 20,000 armoured vehicles, D-Day was, above all, a tale of
...

History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
History of the Later Roman Empire: From the Death of Theodosius I to the Death of Justinian (Volume 1)
The first of these two volumes might be entitled the "German Conquest of Western Europe," and the second the "Age of Justinian." The first covers more than one hundred and twenty years, the second somewhat less than fifty. This disparity is a striking illustration of the fact that...
Constrained Optimization and Optimal Control for Partial Differential Equations (International Series of Numerical Mathematics)
Constrained Optimization and Optimal Control for Partial Differential Equations (International Series of Numerical Mathematics)

This special volume focuses on optimization and control of processes governed by partial differential equations. The contributors are mostly participants of the DFG-priority program 1253: Optimization with PDE-constraints which is active since 2006. The book is organized in sections which cover almost the entire spectrum of modern research in...

Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications
Signal Analysis: Wavelets, Filter Banks, Time-Frequency Transforms and Applications
"...excellent and interesting reading for digital signal processing engineers and designers and for postgraduate students in electrical and computer faculties." (Mathematical Reviews, 2002d)

Signal Analysis explores methods that offer an insight into the properties of signals and stochastic processes. This
...
Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Flexible Shift Planning in the Service Industry: The Case of Physicians in Hospitals
Flexible Shift Planning in the Service Industry: The Case of Physicians in Hospitals

The book presents new ideas to model and solve the flexible shift planning problem of personnel workers in the service industry. First, a new modeling approach is proposed that requires shifts to be generated implicitly rather than employing a predefined set of shift types like three 8-hour or two 12-hour shifts to cover varying forecast demand....

Sex with the Queen: 900 Years of Vile Kings, Virile Lovers, and Passionate Politics
Sex with the Queen: 900 Years of Vile Kings, Virile Lovers, and Passionate Politics

In this follow-up to her bestselling Sex with Kings, Eleanor Herman reveals the truth about what goes on behind the closed door of a queen's boudoir. Impeccably researched, filled with page-turning romance, passion, and scandal, Sex with the Queen explores the scintillating sexual lives of some of our most...

Das kleine Buch der Zahlen: Vom Abzählen bis zur Kryptographie (German Edition)
Das kleine Buch der Zahlen: Vom Abzählen bis zur Kryptographie (German Edition)

Seit Jahrhunderten sind Menschen fasziniert von Zahlen. Zahlen sind jedem vertraut und bilden ein wesentliches Fundament für unser Verständnis der Welt. Und doch ist uns das Zahlensystem nicht „einfach so“ gegeben, sondern es hat sich über Jahrtausende entwickelt. Trotz aller Fortschritte kann auch heute noch jedes...

unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy