Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)
CO2 Injection in the Network of Carbonate Fractures (Petroleum Engineering)

This book presents guidelines for the design, operation and monitoring of CO2 injection in fractured carbonates, with low permeability in the rock matrix, for geological storage in permanent trapping. 

CO2 migration is dominated by fractures in formations where the hydrodynamic and geochemical effects induced by the...

Silicone Elastomers (Rapra Review Reports)
Silicone Elastomers (Rapra Review Reports)

Silicone elastomers are important materials for many application areas such as automotive, electric and electronics, domestic appliances and medical. They are increasingly being used to substitute for organic rubbers, because of their advantageous properties.

This is a very comprehensive review of the state-of-the-art in silicone...

CEH Certified Ethical Hacker All-in-One Exam Guide
CEH Certified Ethical Hacker All-in-One Exam Guide

Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice...

Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

Go Web Programming
Go Web Programming

Summary

Go Web Programming teaches you how to build scalable, high-performance web applications in Go using modern design principles.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

...

Getting Started with Oracle WebLogic Server 12c: Developer's Guide
Getting Started with Oracle WebLogic Server 12c: Developer's Guide

If you’ve dipped a toe into Java EE development and would now like to dive right in, this is the book for you. Introduces the key components of WebLogic Server and all that’s great about Java EE 6.

Overview

  • Create a complete Java EE 6 application leveraging WebLogic features like JMS, SOAP and...
The Java EE 6 Tutorial: Basic Concepts (4th Edition) (Java Series)
The Java EE 6 Tutorial: Basic Concepts (4th Edition) (Java Series)

The Java EE 6 Tutorial: Basic Concepts, Fourth Edition, is a task-oriented, example-driven guide to developing enterprise applications for the Java Platform, Enterprise Edition 6 (Java EE 6). Written by members of the Java EE 6 documentation team at Oracle, this book provides new and intermediate Java programmers with a deep...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Switching to Angular 2
Switching to Angular 2

Key Features

  • Get up to date with the latest changes to Angular 2, including the improvements to directives, change detection, dependency injection, router, and more
  • Understand Angular 2's new component-based architecture
  • Start using TypeScript to supercharge your Angular 2...
The Well-Grounded Java Developer: Vital techniques of Java 7 and polyglot programming
The Well-Grounded Java Developer: Vital techniques of Java 7 and polyglot programming

Summary

The Well-Grounded Java Developer offers a fresh and practical look at new Java 7 features, new JVM languages, and the array of supporting technologies you need for the next generation of Java-based software.

About the Book

The Well-Grounded Java Developer starts with...

Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy