Chapter 75: I hung on | Die Garde der Löwen | Facebook
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ordinary Differential Equations
Ordinary Differential Equations
Skillfully organized introductory text examines origin of differential equations, then defines basic terms and outlines general solution of a differential equation. Subsequent sections deal with integrating factors; dilution and accretion problems; linearization of first order systems; Laplace Transforms; Newton’s Interpolation Formulas,...
Curves and Singularities
Curves and Singularities
The object of this book is to introduce to a new generation of students an area of mathematics that has received a tremendous impetus during the last twenty years or so from developments in singularity theory.

The differential geometry of curves, families of curves and surfaces in Euclidean space has fascinated mathematicians and users
...
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
Essential details of every major battle on land and sea in recorded history, from the first battle of Megiddo in 1479 B.C. to the Grenada conflict in 1984. Included: strategic situations, roles played by political/military leaders, troop numbers and training, tactics and objectives, casualties and losses and military/political consequences. Index....
The Mathematics of Gambling
The Mathematics of Gambling

Casino card games such as baccarat and blackjack differ significantly from casino games such as craps, roulette, and slot machines in that they are not indepen- dent trial processes-that is, the cards that already have been played do affect the odds on subsequent hands. Consider for a moment the game of blackjack, where the cards...

Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Programming Languages and their Definition: Selected Papers (Lecture Notes in Computer Science) (v. 177)
Programming Languages and their Definition: Selected Papers (Lecture Notes in Computer Science) (v. 177)

The IBM Vienna Laboratory has made a significant contribution to the work on the semantic description of computer systems. Both the operational semantics descriptions ("VDL") and the later work on denotational semantics ("Meta-IV", "VEM") contain interesting scientific ideas. Partly because of the large...

Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Intel OEM Systems Handbook
Intel OEM Systems Handbook

The cover design is an abstract portrayal of Intel's computer systems products as the building blocks of systems development. The building blocks meld together, encompassing the heart of an open system, which is symbolized by the pyramid at the heart of the architecture. This melding or flexibility is the key Intel pres to the design...

Modern Aspects of Electrochemistry 16
Modern Aspects of Electrochemistry 16

This volume of the Modern Aspects of Electrochemistry series con- tains six chapters: four are on topics of current fundamental interest in the subject and two deal with more technological aspects of electrochemistry.

Writing such a chapter on solid metal electrodes is a challenge when, at every moment, the latest...

Principles of CMOS VLSI Design (VLSI systems series)
Principles of CMOS VLSI Design (VLSI systems series)
With this updated text, Weste conveys an understanding of CMOS technology, circuit design, layout, and system design sufficient to feel confident with the technology. The book deals the technology down to the layout level of detail, thereby providing a bridge from a circuit to a form that may be fabricated. The early chapters provide a circuit view...
How to Build Your Own Underground Home
How to Build Your Own Underground Home
As you browse through this second edition of How to Build Your Own Underground Home, you must be asking yourself." What more can he find to write about after three previous books on the subject of underground homes."

The answer is basic. Like many subjects that are surrounded by good old yankee ingenuity, improvements and
...
Result Page: 1 2 Next 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy