 |
|
 Telecommunication Switching and NetworksThis text, ‘Telecommunication Switching and Networks’ is intended to serve as a onesemester text for undergraduate course of Information Technology, Electronics and Communication Engineering, and Telecommunication Engineering. This book provides in depth knowledge on telecommunication switching and good background for advanced... |  |  Scientific Data Mining: A Practical PerspectiveTechnological advances are enabling scientists to collect vast amounts of data in fields such as medicine, remote sensing, astronomy, and high-energy physics. These data arise not only from experiments and observations, but also from computer simulations of complex phenomena. They are often complex, with both spatial and temporal components. As... |  |  Introduction to AutoCAD 2010
Alf Yarwood provides a practical, structured course of work matched to the latest release of AutoCAD. After introducing first principles and the creation of 2D technical drawings, he goes on to demonstrate the construction of 3D solid drawings, surface model drawings and rendering. All the new features of the 2010 software release are... |
|
|
 Computational Physics: Fortran Version
Computational Physics is designed to provide direct experience in the computer modeling of physical systems. Its scope includes the essential numerical techniques needed to "do physics" on a computer. Each of these is developed heuristically in the text, with the aid of simple mathematical illustrations. However, the real ... |  |  Compendium of Quantum Physics: Concepts, Experiments, History and Philosophy
With contributions by many of today's leading quantum physicists, philosophers and historians, including three Nobel laureates, this comprehensive A to Z of quantum physics provides a lucid understanding of the key concepts of quantum theory and experiment. It covers technical and interpretational aspects alike, and includes both... |  |  Network Security: Private Communication in a Public World (2nd Edition)
Authors with credentials from some of the top software and hardware companies explain the latest advances in computer network security protocol. For security managers, programmers, and graduate or advanced undergraduate students.
It was a dark and stormy night. Somewhere in the distance a dog howled. A shiny object... |
|
|
| Result Page: 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 |