Home | Amazing | Today | Tags | Publishers | Years | Search 
Java for Programmers (Deitel Developer)
Java for Programmers (Deitel Developer)

Welcome to Java! We have worked hard to create what we hope you'll find to be an informative, entertaining and challenging professional experience. Java is one of today's most popular and powerful software development languages and is appropriate for experienced programmers to use in building substantial information...

Pharmacology Demystified
Pharmacology Demystified
Just the prescription for mastering pharmacology! .

Looking forward to locking in a great, secure job in the booming healthcare field? Well, before you can graduate and get your license, you have to pass that challenging compulsory course in pharmacology. Luckily, there's no need to be intimidated or confused. In...

Hitting the Wall: A Vision of a Secure Energy Future (Synthesis Lectures on Energy and the Environment: Technology, Science, and Society)
Hitting the Wall: A Vision of a Secure Energy Future (Synthesis Lectures on Energy and the Environment: Technology, Science, and Society)
Hitting the Wall examines the combination of two intractable energy problems of our age: the peaking of global oil production and the overloading of the atmosphere with greenhouse gases. Both emerge from the overconsumption of fossil fuels and solving one problem helps solve the other. The misinformation campaign about climate change is discussed...
Chemical Reaction Engineering, 3rd Edition
Chemical Reaction Engineering, 3rd Edition
Chemical reaction engineering is concerned with the exploitation of chemical reactions on a commercial scale. It's goal is the successful design and operation of chemical reactors. This text emphasizes qualitative arguments, simple design methods, graphical procedures, and frequent comparison of capabilities of the major reactor types. Simple ideas...
Solar Radiation and Daylight Models, Second Edition: For the Energy Efficient Design of Buildings
Solar Radiation and Daylight Models, Second Edition: For the Energy Efficient Design of Buildings
A practical guide to the modelling and application of solar energy data

The cost of operating a building far exceeds the cost of constructing it, and yet until recently little attention was paid to the impact of solar radiation on the costs of heating, cooling and ventilation. And now that there has been a surge in interest
...
Mechanical Engineer's Handbook (Engineering)
Mechanical Engineer's Handbook (Engineering)
The Mechanical Engineer's Handbook was developed and written specifically to fill a need for mechanical engineers and mechanical engineering students throughout the world. With over 1000 pages, 550 illustrations, and 26 tables the Mechanical Engineer's Handbook is very comprehensive, yet affordable, compact, and...
Peer-to-Peer Computing for Mobile Networks: Information Discovery and Dissemination
Peer-to-Peer Computing for Mobile Networks: Information Discovery and Dissemination
Wireless devices are becoming smaller, more user-friendly and more pervasive. Peer-to-Peer Computing for Mobile Networks: Information Discovery and Dissemination discusses research results on data dissemination in mobile networks and peer-to-peer systems for mobile devices.

An important research challenge within this book is to...

Exploring C++: The Programmer's Introduction to C++
Exploring C++: The Programmer's Introduction to C++
Exploring C++ uses a series of self–directed lessons to divide C++ into bite–sized chunks that you can digest as rapidly as you can swallow them. The book assumes only a basic understanding of fundamental programming concepts (variables, functions, expressions, statements) and requires no prior knowledge of C or any other...
Information Warfare: How to Survive Cyber Attacks
Information Warfare: How to Survive Cyber Attacks

"Computers don't attack computers, people do. With Erbschloe's capability taxonomy, we see that there are plenty of new adversaries out there with increasingly powerful cyberweapons and intentions. But most importantly, the greatest threat still comes from "trusted" insiders we so desperately need to, but perhaps shouldn't, trust...

Phase Transformations: Examples from Titanium and Zirconium Alloys (Pergamon Materials Series)
Phase Transformations: Examples from Titanium and Zirconium Alloys (Pergamon Materials Series)
Covers phase transformations and phase reactions with examples from titanium and zirconium based systems

The terms phase transitions and phase transformations are often used in an interchangeable manner in the metallurgical literature.

In this book, transformations driven by pressure changes,
...
Pro Ubuntu Server Administration
Pro Ubuntu Server Administration
Pro Ubuntu Server Administration teaches you advanced Ubuntu system building. After reading this book, you will be able to manage anything from simple file servers to multiple virtual servers to high–availability clusters. This is the capstone volume of the Apress Ubuntu trilogy that includes Beginning Ubuntu Linux, Third...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
Result Page: 740 739 738 737 736 735 734 733 732 731 730 729 728 727 726 725 724 723 722 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy