Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Archaeology of Athens
The Archaeology of Athens
The city of Athens has played a leading role in the development of European civilization. When we look back through time to the origins of so many of the institutions and activities which thrive or are valued today, we are led to ancient Greece and, most often, to Athens in the Classical period (480–323 B.C.). Time and again...
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
Essential details of every major battle on land and sea in recorded history, from the first battle of Megiddo in 1479 B.C. to the Grenada conflict in 1984. Included: strategic situations, roles played by political/military leaders, troop numbers and training, tactics and objectives, casualties and losses and military/political consequences. Index....
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers
ROI of Software Process Improvement: Metrics for Project Managers and Software Engineers

This book masterfully illuminates extremely simple, but overwhelmingly powerful metrics, models, and methods for designing professional business cases while the author demystifies esoteric concepts in ROI.


An indispensable addition to your...

Design and Development of Aerospace Vehicles and Propulsion Systems: Proceedings of SAROD 2018 (Lecture Notes in Mechanical Engineering)
Design and Development of Aerospace Vehicles and Propulsion Systems: Proceedings of SAROD 2018 (Lecture Notes in Mechanical Engineering)
This book presents selected papers presented in the Symposium on Applied Aerodynamics and Design of Aerospace Vehicles (SAROD 2018), which was  jointly organized  by Aeronautical Development Agency (the nodal agency for the design and development of combat aircraft in India),  Gas-Turbine Research Establishment (responsible for...
Design of Experiments in Chemical Engineering: A Practical Guide
Design of Experiments in Chemical Engineering: A Practical Guide

While existing books related to DOE are focused either on process or mixture factors or analyze specific tools from DOE science, this text is structured both horizontally and vertically, covering the three most common objectives of any experimental research:

  • screening designs
  • mathematical modeling, and...
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
This book describes inventions and designs of ancient engineers that are the precursors of the present. The ages mainly range from 300 B.C. to 1600 A.D. with some exceptions from before and after this period.

As for the very ancient ones, the book describes inventions (documented by archaeological finds mainly from Pompei, Ercolano and Stabia)...

CompTIA Security+ 2008 In Depth
CompTIA Security+ 2008 In Depth

Security continues to be the number-one concern of computer professionals today, and with good reason. Consider the evidence: as many as 150 million computers worldwide may be remotely controlled by attackers. Over 94 million credit and debit cards were compromised in one data security breach, with losses totaling over $140 million. On average,...

Blitzkrieg: From the Ground Up
Blitzkrieg: From the Ground Up

An examination of the German Blitzkrieg operations from Poland to Operation Barbarossa, as experienced by junior commanders and enlisted men, exploring why they were so successful.

The successes of the German Blitzkrieg in 1939–41 were as surprising as they were swift. Allied
...

Active Defense: A Comprehensive Guide to Network Security
Active Defense: A Comprehensive Guide to Network Security
Today's networks incorporate more security features than ever before, yet
hacking grows more common and more severe. Technology alone is not the
answer. You need the knowledge to select and deploy the technology
effectively, and the guidance of experts to develop a comprehensive plan that
keeps your organization two steps ahead
...
Network Security Assessment: Know Your Network
Network Security Assessment: Know Your Network
How secure is your network? The best way to find out is to attack it. Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this...
Linux Network Security (Administrator's Advantage Series)
Linux Network Security (Administrator's Advantage Series)

Linux networks are becoming more and more common, but security is often an overlooked issue. Unfortunately, in today’s environment all networks are potential hacker targets, from top-secret military research networks to small home LANs. Linux Network Security focuses on securing Linux in a networked environment, where the security...

Colonial Effects
Colonial Effects
The object of this study is the production of national identity and national culture within Jordan as both a typical and an atypical postcolonial nation-state. Recent studies of nationalism describe the nation as “invented”1 or “imagined,”2 by intellectuals and/or political elites who are producers of, or produced by, the...
unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy