|
|
|
MySQL (OTHER NEW RIDERS)The unexpected pleasure of reading books about databases is that they are often written by authors with highly organized minds. Paul DuBois and his editors at New Riders have assembled MySQL with a clarity and lucidity that inspires confidence in the subject matter: a (nearly) freely redistributable SQL-interpreting database client/server... | | | | Tribology in Machine DesignTribology in Machine Design explains the role of tribology in the design of machine elements. It shows how algorithms developed from the basic principles of tribology can be used in a range of practical applications within mechanical devices and systems.
The computer offers today's designer the possibility of greater stringency of... |
|
Engineering Heat Transfer, Second Edition
In writing Engineering Hear Trmnfer, I have attempted to provide the reader with a foundation
in the study of heat-transfer principles while also emphasizing some of the topic's practical
applications. The mathematics presented in the text should not present undue learning difficulties
to the student who has completed first... | | Ceramics and Ceramic Composites: Materialographic Preparation
Ceramics and ceramic composites are now used in almost all areas of technology.
Consequently, it is becoming increasingly important to study polished sections of
these materials in industrial laboratories by means of optical microscopes and scanning
electron microscopes. In some cases, the experience required for the preparation... | | Geographic Profiling
Scientific criminology has its roots in crime mapping. The first great systematic
studies of crime were cartographic exercises made possible by recordkeeping
systems created to track criminal convictions in France and England
during the early part of the 19th century. Compared with maps of demographic,
economic, and social... |
|
| | Mathematical PuzzlingMany of those who read this book will be interested in the puzzles and investigations for their own sake. Everyone will, I trust, find some things that are new - perhaps even refreshing, And I hope that those who teach mathematics win find the collection especially useful. The problems will challenge and stimulate able youngsters in a way which... | | Fundamentals of Cryptology: A Professional Reference and Interactive TutorialThe protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g.... |
|
Result Page: Previous 42 43 Next |