Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Irreversible Phenomena: Ignitions, Combustion and Detonation Waves
Irreversible Phenomena: Ignitions, Combustion and Detonation Waves

Ideals are simple and able to be easily understood, but never exist in reality.

In this book a theory based on the second law of thermodynamics and its applications are described. In thermodynamics there is a concept of an ideal gas which satisfies a mathematical formula PV = RT. This formula can approximately be applied to the...

Getting Started with Roo
Getting Started with Roo

This is my first book with O’Reilly, and I’m very grateful for their help and encouragement. Their editorial team is first class, and efficient. It was great working with you.

I, like many of you, have been using Spring for a long, long time. I wasn’t initially convinced I needed Spring Roo (to be honest). It...

The Texas Chain Saw Massacre: The Film That Terrified a Rattled Nation
The Texas Chain Saw Massacre: The Film That Terrified a Rattled Nation
Lanza turns his attentions to the production, reception, social climate, and impact of a movie that rattled the American psyche in the wake of Nixon, Watergate, and Vietnam.

When Tobe Hooper’s low-budget slasher film, The Texas Chainsaw Massacre, opened in theaters in 1974, it was met in equal measure
...
New Era Value Investing: A Disciplined Approach to Buying Value and Growth Stocks
New Era Value Investing: A Disciplined Approach to Buying Value and Growth Stocks
A unique guide that combines the best of traditional value theory with an innovative approach to assessing value in low or non-dividend paying stocks

In the 1990s, America's focus on productivity and innovation led to huge gains in technology, communication, and healthcare stocks, and contributed to the transformation of the...

Linux Ethernet Howto
Linux Ethernet Howto
The Linux Ethernet-HOWTO is a compilation of information about which Ethernet devices can be used for Linux, and how to set them up. This HOWTO is focused on the hardware and low-level driver aspect of the Ethernet cards, and does not cover the software end of things like ifconfig and route (this material is covered in the Network HOWTO).
...
The BIOS Companion: The book that doesn't come with your motherboard!
The BIOS Companion: The book that doesn't come with your motherboard!
The instructions that turn a PC into a useful machine come in three stages, starting with application programs, which are loaded by an operating system, which in turn is loaded by a bootstrap loader in the BIOS (the Basic Input/Output System). There are several in a PC, a good example being the one on the video card that controls the interface...
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Ending Spam: Bayesian Content Filtering and the Art of Statistical Language Classification
Join author John Zdziarski for a look inside the brilliant minds that have conceived clever new ways to fight spam in all its nefarious forms. This landmark title describes, in-depth, how statistical filtering is being used by next-generation spam filters to identify and filter unwanted messages, how spam filtering works and how language...
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives
Service Oriented Architecture Field Guide for Executives is a fundamental breakthrough in the business and technology perspectives of service oriented architecture (SOA). A valuable resource to help you understand and realize the benefits of SOA in today's companies, this guide will show you how to plan, implement, and achieve SOA value....
Microwave De-embedding: From Theory to Applications
Microwave De-embedding: From Theory to Applications

This groundbreaking book is the first to give an introduction to microwave de-embedding, showing how it is the cornerstone for waveform engineering. The authors of each chapter clearly explain the theoretical concepts, providing a foundation that supports linear and non-linear measurements, modelling and circuit design. Recent developments...

Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities
Penetration Testing with Shellcode: Detect, exploit, and secure network-level and operating system vulnerabilities

Master Shellcode to leverage the buffer overflow concept

Key Features

  • Understand how systems can be bypassed both at the operating system and network level with shellcode, assembly, and Metasploit
  • Learn to write and modify 64-bit shellcode along with kernel-level shellcode...
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Augmented Vision Perception in Infrared: Algorithms and Applied Systems (Advances in Pattern Recognition)
Spurred by security and safety challenges, research efforts in thermographic sensors have advanced greatly, resulting in better performance in remote surveillance, object recognition, guidance and so on.

 

This comprehensive survey provides a thorough account of the recent deployment of infrared sensors in modern applications of...

Shock Waves: Measuring The Dynamic Response Of Materials
Shock Waves: Measuring The Dynamic Response Of Materials
It is a great book to learn about materials behavior in shock waves and instrumentation used to obtain the data. -- IEEE Electrical Insulation Magazine

This book presents, in a concise and comprehensive manner, the essential techniques by which shock wave physicists probe the boundaries of material response to
...
unlimited object storage image
Result Page: 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy