Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Newnes Electrical Power Engineer's Handbook, Second Edition
Newnes Electrical Power Engineer's Handbook, Second Edition
The second edition of this popular engineering reference book, previously titles Newnes Electrical Engineer's Handbook, provides a basic understanding of the underlying theory and operation of the major classes of electrical equipment.

With coverage including the key principles of electrical engineering and the design and operation of
...
Network Security Essentials: Applications and Standards (4th Edition)
Network Security Essentials: Applications and Standards (4th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

Beginning Python Visualization: Crafting Visual Transformation Scripts
Beginning Python Visualization: Crafting Visual Transformation Scripts

We are visual animals. But before we can see the world in its true splendor, our brains, just like our computers, have to sort and organize raw data, and then transform that data to produce new images of the world. Beginning Python Visualization: Crafting Visual Transformation Scripts, Second Edition discusses turning many types of...

Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Principles of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems
Bacterial contamination of food and water resources, as well as the increasing incidence of nosocomial infections, has us on our toes, looking for ways of recognizing these elements. In addition, the recent and growing threats to personal and territorial securities make this task even  more urgent. Therefore, accurate assessment of the state...
Foundations of Python Network Programming
Foundations of Python Network Programming

Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3.

Some of the new topics in this edition...

The Drinking Water Handbook, Second Edition
The Drinking Water Handbook, Second Edition

When you open the tap to fill your glass with drinking water, you expect the water to be of good quality. But is the water from your tap really safe? The second edition of an industry-wide bestseller, The Drinking Water Handbook explains the many processes employed to make water safe to drink. Starting at the source, it...

Python Data Visualization Cookbook
Python Data Visualization Cookbook

As a developer with knowledge of Python you are already in a great position to start using data visualization. This superb cookbook shows you how in plain language and practical recipes, culminating with 3D animations.

Overview

  • Learn how to set up an optimal Python environment for data visualization
  • ...
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process (2nd Edition)
Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and the Unified Process (2nd Edition)
“People often ask me which is the best book to introduce them to the world of OO design. Ever since I came across it, ‘Applying UML and Patterns’ has been my unreserved choice.” —Martin Fowler, author, “UML Distilled” and “Refactoring”

The first edition of “Applying UML and Patterns:...

Reservoir Engineering Handbook
Reservoir Engineering Handbook
"...this publication provides a comprehensive and up-to-date reference tool for the reservoir engineer or reservoir engineering student. It covers reservoir fluid behaviour and properties, including laboratory analysis and reservoir fluid flow. It provides a guide to predicting oil reservoir performance through analysis of oil recovery...
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

Kalman Filter Recent Advances and Applications
Kalman Filter Recent Advances and Applications
The discussion about the manned spacecraft program was initiated at NASA in 1959. Only one year later, Dr. Kalman and Dr. Schmidt linked the linear Kalman filter and the perturbation theory in order to obtain the Kalman-Schmidt filter, currently known as the extended Kalman filter. This approach would be implemented in 1961 using an...
An Introduction to the Analysis of Algorithms (2nd Edition)
An Introduction to the Analysis of Algorithms (2nd Edition)

Despite growing interest, basic information on methods and models for mathematically analyzing algorithms has rarely been directly accessible to practitioners, researchers, or students. An Introduction to the Analysis of Algorithms, Second Edition, organizes and presents that knowledge, fully...

unlimited object storage image
Result Page: 348 347 346 345 344 343 342 341 340 339 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy