Julia Roberts | Ekonomist – Temmuz 22, 2018 | тег Завершён
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
Cyber Racism: White Supremacy Online and the New Attack on Civil Rights (Pespectives on a Multiracial America Series)
I have spent almost ten years doing the research for, thinking about, and finally writing this book. In the pages that follow, I emphasize the importance of understanding standpoint when critically evaluating information on the Internet, so it seems only fitting that I should say something about my own relation to the text.

This book
...
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
An Introduction to Modeling and Simulation of Particulate Flows (Computational Science and Engineering)
The relatively recent increase in computational power available for mathematical modeling and simulation raises the possibility that modern numerical methods can play a significant role in the analysis of complex particulate flows. This introductory monograph focuses on basic models and physically based computational solution strategies for the...
Finite Element Methods for Engineers
Finite Element Methods for Engineers
The advent of high-speed electronic digital computers has given tremendous impetus to all numerical methods for solving engineering problems. Finite element methods form one of the most versatile classes of such methods, and were originally developed in the field of structural analysis. They are, however, equally applicable to continuum mechanics...
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design

Sometimes you have to do good engineering to straighten out twisted politics. The Electronic Frontier Foundation, a nonprofit organization that was founded to ensure that the principles embodied in the Constitution and Bill of Rights are protected as new communications technologies emerge, and O"Reilly, the premier publisher of computer...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard
Cybercrime Investigation Case Studies: An Excerpt from Placing the Suspect Behind the Keyboard

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...

Computational Engineering - Introduction to Numerical Methods
Computational Engineering - Introduction to Numerical Methods
This book is an introduction to modern numerical methods in engineering. It covers applications in fluid mechanics, structural mechanics, and heat transfer as the most relevant fields for engineering disciplines such as computational engineering, scientific computing, mechanical engineering as well as chemical and civil engineering. The content...
Cost Optimization of Structures: Fuzzy Logic, Genetic Algorithms, and Parallel Computing
Cost Optimization of Structures: Fuzzy Logic, Genetic Algorithms, and Parallel Computing
While the weight of a structure constitutes a significant part of the cost, a minimum weight design is not necessarily the minimum cost design. Little attention in structural optimization has been paid to the cost optimization problem, particularly of realistic three-dimensional structures. Cost optimization is becoming a priority in all civil...
Introduction to Civil Engineering Systems: A Systems Perspective to the Development of Civil Engineering Facilities
Introduction to Civil Engineering Systems: A Systems Perspective to the Development of Civil Engineering Facilities

This book presents an integrated systems approach to the evaluation, analysis, design, and maintenance of civil engineering systems. Addressing recent concerns about the world's aging civil infrastructure and its environmental impact, the author makes the case for why any civil infrastructure should be seen as part of a larger whole. He...

Fuzzy Logic with Engineering Applications
Fuzzy Logic with Engineering Applications

Fuzzy logic is a simple phrase that actually refers to a large subject dealing with a set of methods to characterize and quantify uncertainty in engineering systems that arise from ambiguity, imprecision, fuzziness, and lack of knowledge.

This 15-chapter textbook remains the only major text that can be used for both undergraduate...

Military Intelligence Blunders
Military Intelligence Blunders

This is a book that tries to tell the story of some recent events, all within living memory, from a different angle: intelligence. Most of us have read press accounts and books about the events that unfold on these pages. But very few of us have seen the events from the inside. The inside implies knowledge: and knowledge means power.

...

Introduction to Linear Elasticity
Introduction to Linear Elasticity

Introduction to Linear Elasticity, 3rd Edition provides an applications-oriented grounding in the tensor-based theory of elasticity for students in mechanical, civil, aeronautical, biomedical engineering, as well as materials and earth science. The book is distinct from the traditional text aimed at graduate students in solid mechanics...

Result Page: 18 17 16 15 14 13 12 11 10 9 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy