Home | Amazing | Today | Tags | Publishers | Years | Search 
Failed Stone
Failed Stone
In the spring of 2002, I wrote a book entitled Falling Glass: Problems and Solutions in Contemporary Architecture. The research for Falling Glass helped me understand how glass failures could be avoided and enlightened me as to which innovations were being explored within the glass industry. Originally, the book was...
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
Oil and Security: A World beyond Petroleum (Topics in Safety, Risk, Reliability and Quality)
The celebration welcoming the second half of the 21st century on 31 December 2050 was subdued in the Persian Gulf. The major cities of Saudi Arabia, Kuwait, and others were dark. No fireworks or other signs of jubilation. Even those among them who had diversified their economies by investing in tourism, technology parks,...
Microfluidics for Biotechnology (Microelectromechanical Systems)
Microfluidics for Biotechnology (Microelectromechanical Systems)
Since the concept of the first DNA biochip, biotechnologies have soared, deeply changing the world of biology. In fact, they have already had direct implications on each of us. Since the very beginning of this science in the 1980s, spectacular advances have been made, such as the analysis of the human DNA genome sequence, while...
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology
Business intelligence and data warehousing projects can be challenging and complex. Dealing with new technologies, processes, and different stakeholders presents an array of potential problems. To aid the project manager, there are recipes about project definition, scope, control, and risk management. Requirements, design, data analysis,...
Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Beginning Database Design: From Novice to Professional (Beginning Apress)
Beginning Database Design: From Novice to Professional (Beginning Apress)
Everyone keeps data. Big organizations spend millions to look after their payroll, customer, and transaction data. The penalties for getting it wrong are severe: businesses may collapse, shareholders and customers lose money, and for many organizations (airlines, health boards, energy companies), it is not exaggerating to say that...
Network Forensics: Tracking Hackers through Cyberspace
Network Forensics: Tracking Hackers through Cyberspace
My great-grandfather was a furniture maker. I am writing this on his table, sitting in his chair. His world was one of craft, “the skilled practice of a practical occupation.”1 He made furniture late in life that was in superficial respects the same as that which he made earlier, but one can see his craft advance. ...
Robotic Welding, Intelligence and Automation (Lecture Notes in Control and Information Sciences)
Robotic Welding, Intelligence and Automation (Lecture Notes in Control and Information Sciences)
Robotic welding systems have been used in different types of manufacturing. They can provide several benefits in welding applications. The most prominent advantages of robotic welding are precision and productivity. Another benefit is that labor costs can be reduced. Robotic welding also reduces risk by moving the human...
Hepatocellular Cancer: Diagnosis and Treatment (Current Clinical Oncology)
Hepatocellular Cancer: Diagnosis and Treatment (Current Clinical Oncology)
Hepatocellular carcinoma (HCC) used to be regarded as a rare disease. The increasing numbers of chronic hepatitis C virus carriers in the United States and subsequent increased incidence of HCC seen in most large medical centers means that it is no longer an uncommon disease for most gastroenterologists or oncologists to...
HIV & AIDS in Schools: The Political Economy of Pressure Groups & Miseducation (Occasional Paper, 121)
HIV & AIDS in Schools: The Political Economy of Pressure Groups & Miseducation (Occasional Paper, 121)

HIV and Aids teaching is compulsory in British schools but the content is not prescribed. Should teaching in such a difficult field, where there are disputes among experts, be left to secondary school teachers with no specialist knowledge? And is it right that the subject should be compulsory? These awkward issues are confronted in this...

Outcome Prediction in Cancer
Outcome Prediction in Cancer

This book is organized into 4 sections, each looking at the question of outcome prediction in cancer from a different angle. The first section describes the clinical problem and some of the predicaments that clinicians face in dealing with cancer. Amongst issues discussed in this section are the TNM staging, accepted methods for survival...

Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Result Page: 99 98 97 96 95 94 93 92 91 90 89 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy