Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Fundamental Astronomy
Fundamental Astronomy

Fundamental Astronomy gives a well-balanced and comprehensive introduction to the topics of classical and modern astronomy. While emphasizing both the astronomical concepts and the underlying physical principles, the text provides a sound basis for more profound studies in the astronomical sciences.

The fifth edition of this...

Simple Steps to Success: Bamboos & Grasses
Simple Steps to Success: Bamboos & Grasses

With all the latest horticultural tips and techniques to guarantee success, Bamboo & Grasses is designed to meet the requirements of today's small garden owners who want to enjoy gardening while making the most of their time and effort.

...
Inside SQLite
Inside SQLite

SQLite is a small, zero-configuration, custom-tailored, embeddable, threadsafe, easily maintainable, transactionoriented, SQL-based, relational database management system. There is no separate install or setup procedure to initialize SQLite before using it. There is no configuration file.

SQLite is open source, and...

Computer-Based Numerical & Statistical Techniques (with CD-ROM)(Mathematics)
Computer-Based Numerical & Statistical Techniques (with CD-ROM)(Mathematics)
T he limitations of analytical methods in practical applications have led mathematicians to evolve numerical methods. We know that exact methods often fail in drawing plausible inferences from a given set of tabulated data or in finding roots of transcendental equations or in solving non-linear differential equations.

Even if analytical
...
Getting Your PhD: A Practical Insider's Guide (Survival Skills for Scholars)
Getting Your PhD: A Practical Insider's Guide (Survival Skills for Scholars)
Packed with practical advice on all aspects of the PhD process, new and continuing research students should find this book of great help.

Professor Malcolm Tight, Lancaster University, UK

How to get your Ph.D is an original study guide aimed at prospective and current postgraduate students, covering the process of
...

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness
I graduated from Long Island University in 1991 with a bachelor’s degree in political science. In the years since, much of the specifi c material I learned has been forgotten in the whirlwind of family and career life. Even so, there are some important lessons I still recall. Dr. Donald Baker often told us undergraduate students that states...
Botnets: The Killer Web App
Botnets: The Killer Web App
This is the first book to explain the newest internet threat - Botnets, zombie armies, bot herders, what is being done, and what you can do to protect your enterprise!

The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world
...
Handbook of Software Quality Assurance
Handbook of Software Quality Assurance
The industry's top guide to software quality -- completely updated!

Practical techniques for mission-critical and commercial software.

Build a great software quality organization.

Prepare for ASQ Software Quality Engineer Certification.

Software quality assurance has never been more challenging -- nor more...

The Fabulous Fibonacci Numbers
The Fabulous Fibonacci Numbers
"...delightful...accessible to anyone who enjoys or enjoyed high school mathematics. Mathematics teachers from middle school through college will find this book fun to read and useful in the classroom. The authors consider more properties, relationships, and applications of the Fibonacci numbers than most other sources do...I enjoyed reading...
Spying Blind: The CIA, the FBI, and the Origins of 9/11
Spying Blind: The CIA, the FBI, and the Origins of 9/11

In this pathbreaking book, Amy Zegart provides the first scholarly examination of the intelligence failures that preceded September 11. Until now, those failures have been attributed largely to individual mistakes. But Zegart shows how and why the intelligence system itself left us vulnerable.

Zegart argues that after the Cold War...

unlimited object storage image
Result Page: 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy