Account
Orders
Advanced search
This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of computer security.Written in an easy to read, non technical style the book is essential reading...
The aim of this volume is to explore the challenges posed by the rapid development of Computational Fluid Dynamics (CFD) within the field of engineering. CFD is already essential to research concerned with fluid flow in civil engineering, and its further potential for...
In a world at the eve of digital television by satellite and cable, this publication provides a state-of-the-art exploration of the latest developments in HDTV technology. It highlights the technologies needed to launch HDTV from demonstration and trial status to that...
Please note this is a Short Discount publication. A new category of product has been developed which needs to be considered by any purchaser of a high performance machine: minisupercomputers. Thoroughly revised and updated this years report compares in–depth, these...
Centrifugal Pumps describes the whole range of the centrifugal pump (mixed flow and axial flow pumps are dealt with more briefly), with emphasis on the development of the boiler feed pump. Organized into 46 chapters, this book discusses the general hydrodynamic...
Impinging streams is a unique and multipurpose configuration of a two-phase suspension for intensifying transfer processes in heterogeneous systems, viz. gas-solid, gas-liquid, solid-liquid and liquid-liquid. The essence of the method lies in the collision which results...
This dictionary supplies associations which have been evoked by certain words, signs, etc. in Western civilization in the past, and which may float to the surface again tomorrow; for however 'daringly new' a modern use of imagery may look, it generally appears to have...
Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively. Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security...
This is a book about systems, including: systems in which humans control machines; systems in which humans interact with humans and the machine component is relatively unimportant; systems which are heavily computerized and those that are not; and governmental,...
As the ergonomic aspect of many problems facing the industry today attracts more attention from the management, providing scientific knowledge and the know-how to solve such problems is becoming increasingly more important. The impetus for this book originated from the...
Please note this is a Short Discount publication. A comprehensive guide to EDP contingency planning and disaster recovery. Thoroughly revised and updated from the last edition [published 1989], this best selling management guide has been re–written to reflect the...
The second part of this Handbook presents a choice of material on the theory of automata and rewriting systems, the foundations of modern programming languages, logics for program specification and verification, and some chapters on the theoretic modelling of advanced...
The Third World Congress on Biosensors Abstracts
Please note this is a Short Discount publication. Thoroughly revised and updated, this year's report contains invaluable information investigating the impact of supercomputing technology on data processing in the near term and its influence for the next five years. ...
Please note this is a Short Discount publication. NETBIOS Report and Reference is essential reading for managers, implementors and serious users of PC local area networks. It covers NETBIOS and related technology issues. The report beings with a history and conceptual...
Please note this is a Short Discount publication. This report covers the concept, status, and implementation of the IBM Information Network, IIN, IBM appears to be developing a service bureau for telecommunication systems. This service bureau will provide...
This first part presents chapters on models of computation, complexity theory, data structures, and efficient computation in many recognized sub-disciplines of Theoretical Computer Science.
Vertical flow constructed wetlands for wastewater and sludge treatment represent a relatively new and still growing technology.Vertical Flow Constructed Wetlands is the first book to present the state-of-the-art knowledge regarding vertical flow constructed wetlands...
Assessment of Vulnerability to Natural Hazards covers the vulnerability of human and environmental systems to climate change and eight natural hazards: earthquakes, floods, landslides, avalanches, forest fires, drought, coastal erosion, and heat waves. This book is an...
Personnel Protection: Threat Assessment Profile is a video presentation. Length: 12 minutes. InPersonnel Protection: Threat Assessment Profile, presenters Jerome Miller and Radford Jones discuss the threat assessment profile as the basis for determining the need for an...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers