Jack Taylor | Sharp Objects 1ª Temporada Episódio 06 Online – LEGENDADO | Hunter x Hunter
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
Project Managers at Work
Project Managers at Work

Read 25 in-depth, candid interviews with notable project managers. Discover how project managers work, what they do, how they adapt and make decisions, how they inspire and motivate others, what career lessons and advice they can share, and how they landed their current jobs either as project managers or in more senior positions thanks to...

Build Supercomputers with Raspberry Pi 3
Build Supercomputers with Raspberry Pi 3

Key Features

  • Carlos R. Morrison from NASA will teach you to build a supercomputer with Raspberry Pi 3
  • Deepen your understanding of setting up host nodes, configuring networks, and automating mountable drives
  • Learn various math, physics, and engineering applications to solve complex...
C++ for Mathematicians: An Introduction for Students and Professionals
C++ for Mathematicians: An Introduction for Students and Professionals

The first book available on C++ programming that is written specifically for a mathematical audience, C++ for Mathematicians omits the language's more obscure features in favor of the aspects of greatest utility for mathematical work. Emphasizing the essential role of practice as part of the learning process, the book is ideally designed for...

Test and Measurement: Know It All (Newnes Know It All)
Test and Measurement: Know It All (Newnes Know It All)

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!

Field Application engineers need to master a wide area of
...

Fault Analysis in Cryptography (Information Security and Cryptography)
Fault Analysis in Cryptography (Information Security and Cryptography)

In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic...

Battery Systems Engineering
Battery Systems Engineering

A complete all-in-one reference on the important interdisciplinary topic of Battery Systems Engineering

Focusing on the interdisciplinary area of battery systems engineering, this book provides the background, models, solution techniques, and systems theory that are necessary for the development of advanced battery management...

Knowledge Retention: Strategies and Solutions
Knowledge Retention: Strategies and Solutions
‘‘Knowledge Retention: Strategies and Solutions will become paramount toward achieving success in an increasingly competitive environment.’’

—Jay Liebowitz

As the baby boomer generation approaches retirement age, many organizations are facing the potential
...
Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications

Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager...

Innovations in Fuzzy Clustering: Theory and Applications (Studies in Fuzziness and Soft Computing)
Innovations in Fuzzy Clustering: Theory and Applications (Studies in Fuzziness and Soft Computing)
There is a great interest in clustering techniques due to the vast amount of data generated in every field including business, health, science, engineering, aerospace, management and so on. It is essential to extract useful information from the data. Clustering techniques are widely used in pattern recognition and related applications.

The...

Special Bundle for the University of Liverpool, UK; An Introduction to Mechanical Engineering; Part I and An Intntroduction to Mechanical Engineering: ... to Mechanical Engineering: Part 2 (Pt. 2)
Special Bundle for the University of Liverpool, UK; An Introduction to Mechanical Engineering; Part I and An Intntroduction to Mechanical Engineering: ... to Mechanical Engineering: Part 2 (Pt. 2)

An Introduction to Mechanical Engineering: Part 2 is an essential text for all second-year undergraduate students as well as those studying foundation degrees and HNDs. The text provides thorough coverage of the following core engineering topics:

  1. Fluid dynamics
  2. Thermodynamics
  3. ...
Cooperative Control of Distributed Multi-Agent Systems
Cooperative Control of Distributed Multi-Agent Systems

The paradigm of ‘multi-agent’ cooperative control is the challenge frontier for new control system application domains, and as a research area it has experienced a considerable increase in activity in recent years. This volume, the result of a UCLA collaborative project with Caltech, Cornell and MIT, presents cutting edge results in...

Result Page: 14 13 12 11 10 9 8 7 6 5 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy