Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Surface and Underground Excavations, 2nd Edition: Methods, Techniques and Equipment
Surface and Underground Excavations, 2nd Edition: Methods, Techniques and Equipment

Surface and Underground Excavations – Methods, Techniques and Equipment (2nd edition) covers the latest technologies and developments in the excavation arena at any locale: surface or underground. In the first few chapters, unit operations are discussed and subsequently, excavation techniques are described for various operations:...

Fracking: The Operations and Environmental Consequences of Hydraulic Fracturing (Energy Sustainability)
Fracking: The Operations and Environmental Consequences of Hydraulic Fracturing (Energy Sustainability)
Hydraulic fracturing (also known as fracking, fracing, or worse) of rock deep beneath the surface to release petroleum product has become a contentious subject across the globe. This practice is not to be confused with drilling or extraction. Fracking is the process of using fluid power to fracture rock to release gas (and...
Designing Visual Interfaces: Communication Oriented Techniques
Designing Visual Interfaces: Communication Oriented Techniques
An excellent introduction to the design theories involved in the creation of user interfaces. Instead of the usual examples and pictures of computer screens and application menus, Mullet approaches the concept of UI from its "outside world" roots. With examples ranging from street signs to corporate logos to the map of the London...
Electrical Power Cable Engineering: Second: Edition
Electrical Power Cable Engineering: Second: Edition

Electrical Power Cable Engineering, Second Edition remains the foremost reference on universally used low- and medium-voltage electrical power cables, cataloging technical characteristics and assuring success for cable manufacture, installation, operation, and maintenance. While segments on electrical cable insulation and field assessment...

The Fifty Dollar and Up Underground House Book
The Fifty Dollar and Up Underground House Book
This is a highly personal book, perhaps too much so. I can't help it. I could no more write a dry technical manual than I could dance the Swan Lake Ballet. I have strong opinions, likes and dislikes. They are bound to find their way into these pages. If at times this book sounds like the drunk bellowing at the end of the bar, it was written, after...
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002
2600: The Hacker Quarterly, Summer 2002:

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as
...
You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers
You Are a Mathematician: A Wise and Witty Introduction to the Joy of Numbers

What is the largest number less than 1?

If x and y are any of two different positive numbers, which is larger, x2 + y2 or 2xy?

What do you get if you cross a cube and an octahedron?

Discover the surprising answers as David Wells conclusively proves that: you Are a mathematician

Praise for David Wells's

The...

Modeling and Computation in Engineering II
Modeling and Computation in Engineering II

Modeling and Computation in Engineering II (CMCE 2013, Hong Kong, 22-23 June 2013) includes 50 contributions on modeling and simulation technology, which were presented at the 2nd SREE Conference on Modeling and Computation in Engineering (CMCE 2013) and the 3rd SREE Workshop on Applied Mechanics and Civil Engineering...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003
2600: The Hacker Quarterly, Winter 2002-2003

2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects
...
Revolution in The Valley: The Insanely Great Story of How the Mac Was Made
Revolution in The Valley: The Insanely Great Story of How the Mac Was Made

There was a time, not too long ago, when the typewriter and notebook ruled, and the computer as an everyday tool was simply a vision. Revolution in the Valley traces this vision back to its earliest roots: the hallways and backrooms of Apple, where the groundbreaking Macintosh computer was born. The book traces the development of the...

Freax
Freax

THE HISTORY OF THE COMPUTER DEMOSCENE

Freax is a fast-paced, comprehensive look at the amazing stories of the digital art community known as the "demoscene". For over 20 years, computer programmers, artists and musicians have tweaked, optimized and pushed computers to their limits... all for the sake of...

unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy