Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fires in Silos: Hazards, Prevention, and Fire Fighting
Fires in Silos: Hazards, Prevention, and Fire Fighting
Storage of chemicals in silos is ubiquitous in the chemical, pharmaceutical and other producing industries, and some 80 % of all bulk materials are inflammable. It is here that the risk of large fires arises due to self-ignition or the intrusion of different ignition sources. For firefighters, most silo fires are very difficult to handle due to the...
Visual Studio 2005 All-In-One Desk Reference For Dummies (Computer/Tech)
Visual Studio 2005 All-In-One Desk Reference For Dummies (Computer/Tech)
If you're like me, you were probably a little perplexed by the announcement of the new Visual Studio and .NET platforms. My immediate reaction was, "Oh, no-not another set of tools to learn." Don't get me wrong. I embraced Visual Studio .NET and, like most of you, I looked forward to the stability of Visual Studio 2003 and version 1.1 of...
Windows Netbooks: The Path to Low-Cost Computing (Path to Low Cost Computing)
Windows Netbooks: The Path to Low-Cost Computing (Path to Low Cost Computing)

Netbooks are breaking all the rules longer battery life, lightweight, and easy to use. And best of all is the low price. Whether you already own a netbook or are considering purchasing one, the good news doesn't end there, however. Throw in some free open source and cloud computing software and you got yourself a powerful little computer at a...

Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier
Wild West 2.0: How to Protect and Restore Your Reputation on the Untamed Social Frontier

The Internet is like the Old West a frontier rich with opportunity and hope, but also a rough-and-tumble land of questionable characters, dubious legal jurisdictions, and hidden dangers. And just like the Old West, if you want to stake out your territory, you have to get there first and fend for yourself. On the web, that means defending your...

Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Data Mining Algorithms in C++: Data Patterns and Algorithms for Modern Applications
Discover hidden relationships among the variables in your data, and learn how to exploit these relationships.  This book presents a collection of data-mining algorithms that are effective in a wide variety of prediction and classification applications.  All algorithms include an intuitive explanation of operation, essential...
Intelligence and Human Progress: The Story of What was Hidden in our Genes
Intelligence and Human Progress: The Story of What was Hidden in our Genes

Written by James R. Flynn of the "Flynn effect" (the sustained and substantial increase in intelligence test scores across the world over many decades), Intelligence and Human Progress examines genes and human achievement in all aspects, including what genes allow and forbid in terms of personal life history, the cognitive...

The Rough Guide to Guatemala 4 (Rough Guide Travel Guides)
The Rough Guide to Guatemala 4 (Rough Guide Travel Guides)

The Rough Guide to Guatemala is the essential companion to this astonishing country with detailed coverage of all the main attractions – from the volcanoes and crater lakes to the culturally-rich capital of Guatemala City. The full-colour introduction highlights the spectacular natural beauty of the beaches and wild-life reserves with...

Mastering AutoCAD 2005 and AutoCAD LT 2005
Mastering AutoCAD 2005 and AutoCAD LT 2005

Mastering AutoCAD 2005 and AutoCAD LT 2005 is a fully updated edition of Omura's enduring masterpiece. Once again, he delivers the most comprehensive and comprehensible coverage for AutoCAD and AutoCAD LT users including information on the Sheet Set Manager, field command, table tool and the software's other productivity enhancers. If...

Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)
Agent Intelligence Through Data Mining (Multiagent Systems, Artificial Societies, and Simulated Organizations)

Knowledge, hidden in voluminous data repositories routinely created and maintained by today’s applications, can be extracted by data mining. The next step is to transform this discovered knowledge into the inference mechanisms or simply the behavior of agents and multi-agent systems. Agent Intelligence Through Data Mining addresses this...

MongoDB in Action
MongoDB in Action

Databases are the workhorses of the information age. Like Atlas, they go largely unnoticed in supporting the digital world we’ve come to inhabit. It’s easy to forget that our digital interactions, from commenting and tweeting to searching and sorting, are in essence interactions with a database. Because of this fundamental...

Beginning Ethical Hacking with Python
Beginning Ethical Hacking with Python

Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...

Graph-Based Clustering and Data Visualization Algorithms (SpringerBriefs in Computer Science)
Graph-Based Clustering and Data Visualization Algorithms (SpringerBriefs in Computer Science)
This work presents a data visualization technique that combines graph-based topology representation and dimensionality reduction methods to visualize the intrinsic data structure in a low-dimensional vector space. The application of graphs in clustering and visualization has several advantages. A graph of important edges (where edges...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy