Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Water Dynamics in Plant Production
Water Dynamics in Plant Production
The source of life is water. Life began in the oceans, which represent the largest stock of water on Earth. Much less water is stored below the land surface in the form of fresh groundwater, amounting to not quite 0.8% of the earth’s total water reserves, while lakes and rivers combined only contribute a further...
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The Art of Siege Warfare and Military Architecture from the Classical World to the Middle Ages
The papers in this book present, for the first time, the world of warfare, both defensive and offensive, from the Classical periods to end of the Middle Ages in one collection. These scholarships have attracted ancient writers and generals and nowadays historians, archaeologists and researchers poliorcetics. Military historiography and...
Future Spacecraft Propulsion Systems: Enabling Technologies for Space Exploration (Springer Praxis Books / Astronautical Engineering)
Future Spacecraft Propulsion Systems: Enabling Technologies for Space Exploration (Springer Praxis Books / Astronautical Engineering)

In this second edition of Future Spacecraft Propulsion Systems, the authors demonstrate the need to break free from the old established concepts of expendable rockets, using chemical propulsion, and to develop new breeds of launch vehicle capable of both launching payloads into orbit at a dramatically reduced cost and for sustained operations in...

Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010
Digital Forensics and Cyber Crime: Second International ICST Conference, ICDF2C 2010

The Second International ICST Conference on Digital Forensics and Cyber Crime (ICDF2C 2010) was hosted in Abu Dhabi, United Arab Emirates, during October 4–6, 2010. The conference was attended by over 100 international participants including academics, senior government officials from the UAE, and corporate attendees. ICDF2C 2010...

Building Service Provider Networks
Building Service Provider Networks
Learn how to gain the edge of providing the most reliable service-level guarantees to customers

Network and service provider engineers are often faced with the difficult challenge of meeting a less-than-logical service need of a customer–– and at the most reasonable price. In this book, Howard Berkowitz shows network and service...

Space Science
Space Science

This invaluable book provides an introduction to space science. It brings together the various space science disciplines in one volume, and will benefit a wide audience, particularly students starting their graduate studies. The text presents a unique outlook, which will encourage students to think in broad terms across the whole range of...

Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
Adaptive Control Approach for Software Quality Improvement (Series on Software Engineering & Knowledge Engineering)
The expansion of our reliance on software in many aspects of modern society has coincided with a number of incidents in aeronautics, astronautics, transportation, medical devices, energy generation, banking and finance. Failures caused by software have introduced more than just inconvenience, but significant property damage,...
A Distributed Pi-Calculus
A Distributed Pi-Calculus
Distributed systems are fast becoming the norm in computer science. Formal mathematical models and theories of distributed behavior are needed in order to understand them. This book proposes a distributed pi-calculus called Dpi, for describing the behavior of mobile agents in a distributed world. It is based on an existing formal language, the...
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this...

WebLogic: The Definitive Guide
WebLogic: The Definitive Guide
WebLogic: The Definitive Guide presents a 360-degree view of the world of WebLogic. Exhaustive treatment of the WebLogic server and management console answers any question that readers might think to ask. From building, packaging, and deploying applications, to optimizing the runtime WebLogic environment, dealing...
Combating Spyware in the Enterprise
Combating Spyware in the Enterprise
Spyware is a term that in many ways has become a commonly used substitute for many other types of intrusions on a host.To compare it to something in the nontechnical world, it would be similar to asking someone for some aspirin, but in return getting acetaminophen, ibuprofen, or some other pain...
Coping with Uncertainty: Modeling and Policy Issues
Coping with Uncertainty: Modeling and Policy Issues
Uncertainties and risks have always been, and will remain, present; both in everybody’s life and in policy making. This presence is not always recognized because humans tend to perceive the world in a deterministic way, and in most cases succeed in somehow dealing with uncertainties. However, ignoring uncertainties often results in serious...
unlimited object storage image
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy