Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Geological Fluid Dynamics: Sub-surface Flow and Reactions
Geological Fluid Dynamics: Sub-surface Flow and Reactions
This book is the long-awaited successor to Owen Phillips's classic textbook, Flow and Reactions in Permeable Rocks, published in 1991. In the intervening 18 years between the two, significant advances have been made to our understanding of subterranean flow, especially through the vast amount of research into underground storage of nuclear waste...
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace
Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

One of the most gripping yet improbable stories spawned by the computer revolution, Hacker Crocker is a classic American-dream success story set on the razor edge of high technology. Ejovi Nuwere takes the reader on the roller-coaster ride of his extraordinary life, from the bullet-riddled, drugged-out streets of one of America's...

Excel by Example: A Microsoft Excel Cookbook for Electronics Engineers
Excel by Example: A Microsoft Excel Cookbook for Electronics Engineers
The spreadsheet has become a ubiquitous engineering tool, and Microsoft Excel is the standard spreadsheet software package. Over the years, Excel has become such a complex program that most engineers understand and use only a tiny part of its power and features. This book is aimed at electronics engineers and technicians in particular, showing them...
Lineman and Cablemans Field Manual, Second Edition
Lineman and Cablemans Field Manual, Second Edition
A Compact, On-the-Job Reference for Linemen and Cablemen

Fully updated with the latest NEC and OSHA standards, this one-stop portable guide contains the crucial electrical data, formulas, calculations, and safety information essential at any jobsite. The Lineman's and Cableman's Field Manual, Second Edition,...

The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes
The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...

 
   
   
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy