Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secondary Surveillance Radar (Artech House Radar Library)
Secondary Surveillance Radar (Artech House Radar Library)
Starting with a brief precis of the history of radar, this book concentrates on the principles of Secondary Radar, explaining its genesis during the Second World War, and its subsequent development as a significant feature of modern air travel.

This is followed by a comprehensive description of how Secondary Radar functions. It is clearly...

Windows Home Server Users Guide (Expert's Voice)
Windows Home Server Users Guide (Expert's Voice)
If you’re searching for a practical and comprehensive guide to installing, configuring, and troubleshooting Microsofts Windows Home Server, look no further. Inside Windows Home Server User’s Guide, you’ll learn how to install, configure, and use Windows Home Server and understand how to connect to and manage different...
Systematic Process Improvement Using ISO 9001:2000 and CMMI(sm)
Systematic Process Improvement Using ISO 9001:2000 and CMMI(sm)
After observing and experiencing the difficulties associated with selecting,
implementing, and institutionalizing a standard or standards, we have
developed a systematic approach to implementing both ISO 9001:2000 and
theCMMIÒ by capitalizing on their synergy. This approach also allows organizations
to preserve the
...
HTML, XHTML, and CSS, Sixth Edition (Visual Quickstart Guide)
HTML, XHTML, and CSS, Sixth Edition (Visual Quickstart Guide)
Like previous editions, HTML 4 for the World Wide Web: Visual QuickStart Guide has won universal praise for being the most succinct, indispensable guide to using HTML to design Web pages. Completely updated for HTML 4, this third edition covers such important innovations as Cascading Style Sheets and dynamic HTML, as well as the improved...
Special Functions
Special Functions

I have attempted to 'write this book in such a way that it can be read not only by professional mathematicians, physicists, engineers, and chemists, but also by \yell-trained graduate students in those and closely allied fields. Even the research worker in special functions may notice, however, some results or techniques with which he is...

EW 102: A Second Course in Electronic Warfare
EW 102: A Second Course in Electronic Warfare
Serving as a continuation of the bestselling book EW 101: A First Course in Electronic Warfare, this new volume is a second installment of popular tutorials featured in the Journal of Electronic Defense. Without delving into complex mathematics, this book gives engineers, defense contractors, managers, and government procurers a basic working...
The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street
The Myth of the Rational Market: A History of Risk, Reward, and Delusion on Wall Street

Chronicling the rise and fall of the efficient market theory and the century-long making of the modern financial industry, Justin Fox's The Myth of the Rational Market is as much an intellectual whodunit as a cultural history of the perils and possibilities of risk. The book brings to life the people and ideas that forged modern finance...

Getting a Job in CG: Real Advice from Reel People
Getting a Job in CG: Real Advice from Reel People
Get the Inside Track to Landing an Enviable Job in Computer Graphics

Breaking into the wildly creative and fiery 3D/Effects industry is a tough proposition. With so many talented people competing for each alluring job, it’s imperative that candidates grasp what employers look for and make every attempt to
...
Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
The scope, complexity, and pervasiveness of computer-based and controlled systems continue to increase dramatically. The consequences of these systems failing can range from the mildly annoying to catastrophic, with serious injury occurring or lives lost, human-made and natural systems destroyed, security breached, businesses failed, or...
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Analytical Techniques in the Sciences

This series of books provides coverage of all of the major analytical techniques and their application in the most important areas of physical, life and materials science. Each text is presented in an open learning/distance learning style, in which the learning objectives are clearly identified. The...

Hybrid CMOS Single-Electron-Transistor Device And Circuit Design
Hybrid CMOS Single-Electron-Transistor Device And Circuit Design
CMOS (complementary metal oxide semiconductor) is a widely accepted and utilized technology among electrical engineers involved with circuit design. SET (single electron transistor) technology has recently gained significant attention, because it can be combined with CMOSs to improve overall performance of integrated circuits - reducing power...
SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

unlimited object storage image
Result Page: 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy