Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
U.S. Battleships: An Illustrated Design History
U.S. Battleships: An Illustrated Design History
For more than half a century, the battleship was the primary instrument of sea power and was, therefore, the fundamental strategic weapon of such navies as those of the United States and Great Britain. It excited the kind of high-level interest that today is as sociated with strategic missiles; in 1904 and again in 1908 the president of the United...
VoIP Service Quality : Measuring and Evaluating Packet-Switched Voice
VoIP Service Quality : Measuring and Evaluating Packet-Switched Voice
VoIP SAVINGS AND FLEXIBILITY! TELEPHONE-LINE QUALITY?

Despite the features that make Voice over IP so attractive from the standpoint of cost and flexibility of telephone services, businesses will only adopt it once they’ve determined whether, and under what circumstances, the quality of VoIP will be satisfactory to...

Scheduling: Theory, Algorithms, and Systems
Scheduling: Theory, Algorithms, and Systems

Sequencing and scheduling is a formof decision-making that plays a crucial role in manufacturing and service industries. In the current competitive environment effective sequencing and scheduling has become a necessity for survival in the market-place. Companies have to meet shipping dates that have been committed to customers, as failure to...

Harnessing Knowledge Dynamics: Principled Organizational Knowing & Learning
Harnessing Knowledge Dynamics: Principled Organizational Knowing & Learning
Harnessing Knowledge Dynamics: Principled Organizational Knowing & Learning translates what is arcane and controversial today into managerial guidance that is sophisticated yet practical. It also complements the many existing management books on strategy, technology, knowledge and systems while...
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Probability for Electrical and Computer Engineers
Probability for Electrical and Computer Engineers
About ten years ago we had the idea to begin a course in probability for students of electrical engineering. Prior to that electrical engineering graduate students at the Naval Postgraduate School specializing in communication, control, and signal processing were given a basic course in probability in another department and then began a course in...
From P2P and Grids to Services on the Web: Evolving Distributed Communities (Computer Communications and Networks)
From P2P and Grids to Services on the Web: Evolving Distributed Communities (Computer Communications and Networks)
From the reviews:

"Provides rich background information to beginners entering this subject area. … The diagrams … are clear-cut, as are the snippets of codes. There are hardly any errors throughout the book. … covers a broad and coherent range of distributed-computing techniques … . People with different...

Elements of X-Ray Diffraction (3rd Edition)
Elements of X-Ray Diffraction (3rd Edition)
This edition appears over twenty years after the Second Edition was released. That the Second Edition, without revision, continued as a popular materials text and as a reference book is a tribute to Professor Cullity's clarity and thoroughness.

Instrumentation and techniques have changed considerably, however, in the intervening twenty years,...

Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

Gray Hat Hacking, Second Edition
Gray Hat Hacking, Second Edition
Uncover, plug, and ethically disclose security flaws

Prevent catastrophic network attacks by exposing security flaws, fixing them, and ethically reporting them to the software author. Fully expanded to cover the hacker's latest devious methods, Gray Hat Hacking: The Ethical Hacker's Handbook, Second Edition lays out...

Basic Ship Theory Volume 1, Fifth Edition
Basic Ship Theory Volume 1, Fifth Edition

Rawson and Tupper's Basic Ship Theory, first published in 1968, is widely known as the standard introductory text for naval architecture students, as well as being a useful reference for the more experienced designer.
The fifth edition continues to provide a balance between theory and practice. Volume 1 discusses ship geometry and
...

Ship Stability for Masters and Mates, Sixth Edition
Ship Stability for Masters and Mates, Sixth Edition
Understanding ship stability, the ability of a ship to return to an initial state after disturbing forces and moments, is critical for all maritime students and professionals studying for a deck or engineering certificate of competency, or seeking promotion to a higher rank within the merchant marine or Navy.

The sixth edition of this
...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy