Marknadens största urval
Snabb leverans

Böcker utgivna av Elsevier Science & Technology

Filter
Filter
Sortera efterSortera Populära
  • av Jon S. (Principal Consultant Wilson
    991

    A guide to Test and Measurement.

  • av Joe (Independent Consultant Celko
    521

    Perfectly intelligent programmers often struggle when forced to work with SQL. Why? This title intends to change the way you think about the problems you solve with SQL programs. Focusing on three key table-based techniques, it reveals their power through detailed examples and explanations.

  • av Jean J. (Author and President of Micrium Labrosse
    1 047

    Embedded software is present everywhere - from a garage door opener to implanted medical devices to multicore computer systems. This book covers the development and testing of embedded software from many different angles and using different programming languages.

  • av Graham Pulford
    1 067

    Surveys and explains the technical area of high security locks. This book presents over 100 different locks, organized into 6 basic types. Each chapter introduces the necessary concepts in a historical perspective and further categorizes the locks.

  • av Clifford (Distinguished Research Professor Bragdon
    1 307

    Insecure transportation systems are costing our worldwide mobility-based economy as much as 6 per cent of GDP annually. This title examines this problem in a comprehensive manner and addresses security-based technologies and solutions to minimize risk. It covers air, sea, roadway, rail and public transport modes.

  • av Marc (Marconi Product Development Institute Annacchino
    1 417

    Containing case examples, organizational analysis and project planning tools, this book looks at that longer, organizational view of product development, and how that view can improve product development cycle times and better take advantage of new market opportunities.

  • av Brian (Strategic Design Services Gouin
    727

    Suitable for the practicing or aspiring design consultant, this title brings you step by step through the process of becoming a security consultant, describing how to start the business, market services, write proposals, determine fees, and write a report. It focuses on consulting in security design, not security management.

  •  
    927

    A companion to "Analog Circuit Design: Art, Science, and Personalities", this volume presents viewpoints on subjects related to analog circuit design. It includes visualizing operation of analog circuits. It also describes troubleshooting for optimum circuit performance, and demonstrates how to produce a saleable product.

  • av Gerald L. Kovacich
    1 147

    Security metrics is the application of quantitative, statistical, and/or mathematical analyses to measuring security functional trends and workload. This title provides basic guidance to security professionals so that they can measure the costs of their assets protection program - their security program - as well as its successes and failures.

  •  
    3 417

    Set theory is an autonomous and sophisticated field of mathematics that is extremely successful at analyzing mathematical propositions and gauging their consistency strength. This handbook covers the rich history of scientific turning points in set theory, providing fresh insights and points of view.

  •  
    2 001

    Presents the essays on the work in social choice theory and welfare economics. This title discusses the historical background of social choice theory, the vistas opened by Arrow's "Social Choice and Individual Values", the famous 'socialist planning' controversy, and the theoretical and practical significance of social choice theory.

  • av Lawrence Fennelly
    777

    By covering the essential tips and techniques for investigators, this work includes anecdotes, case studies, and documented procedures. It is intended for those interested in investigations, and also for the readers in and out of the law enforcement field.

  • av Martin (Courant Institute of Mathematical Sciences of New York University Davis
    991

    Covers the key areas of computer science, including recursive function theory, formal languages, and automata. This book is divided into five parts: Computability, Grammars and Automata, Logic, Complexity, and Unsolvability. It also covers in a variety of different arrangements automata theory, computational logic, and complexity theory.

  • av Jack E. (Chief Technology Officer Olson
    921

    Corporate data is important as companies continue to find new ways to use it. This book deals with assessing the quality of corporate data and improving its accuracy using the data profiling method. It explains data profiling and shows how it fits into the larger picture of data quality.

  • av Carl (Security Consultant Roper
    1 271

    Describes the risk management methodology as a specific process, a theory, or a procedure for determining your assets, vulnerabilities, and threats and how security professionals can protect them. This book addresses a systematic approach to logical decision-making about the allocation of scarce security resources.

  •  
    2 371

    Takes stock of the main empirical findings across a spectrum of corporate finance issues, ranging from econometric methodology, to raising capital and capital structure choice, and to managerial incentives and corporate investment behavior.

  • av Stuart (Embedded Systems consultant and author) Ball
    1 181

    Featuring a section on debug, this work includes coverage of avoiding common hardware, software and interrupt problems. It also contains a section on system integration and debug to address the capabilities of emulators and debuggers, a section about combination microcontroller/PLD devices, and information on industry standard embedded platforms.

  • av Sami (Sami Matar Matar Ph.D.
    2 121

    Provides a source of information containing insights into petrochemical reactions and products, process technology, and polymer synthesis. This book reviews and describes the reactions and processes involved in transforming petroleum-based hydrocarbons into the chemicals that form the basis of the multi-billion dollar petrochemical industry.

  • av Analog Devices Inc. (Norwood Analog Devices Inc. Engineeri
    1 347

    Describes the theory behind and the practical design of data conversion circuits as well as describing the different architectures used in A/D and D/A converters. This work provides details on the design of high-speed ADCs, high accuracy DACs and ADCs, and sample-and-hold amplifiers.

  • av Robert D. Grace
    3 041

    Blowout and Well Control Handbook, Second Edition, brings the engineer and rig personnel up to date on all the useful methods, equipment, and project details needed to solve daily well control challenges. Blowouts are the most expensive and one of the most preventable accidents in the oil and gas industry. While some rig crews experience frequent well control incidents, some go years before seeing the real thing. Either way, the crew must always be prepared with quick understanding of the operations and calculations necessary to maintain well control. Updated to cover the lessons learned and new technology following the Macondo incident, this fully detailed reference will cover detection of influxes and losses in equipment and methods, a greater emphasis on kick tolerance considerations, an expanded section on floating drilling and deepwater floating drilling procedures, and a new blowout case history from Bangladesh. With updated photos, case studies, and practice examples, Blowout and Well Control Handbook, Second Edition will continue to deliver critical and modern well control information to ensure engineers and personnel stay safe, environmentally-responsible, and effective on the rig. Features updated and new case studies including a chapter devoted to the lessons learned and new procedures following MacondoTeaches new technology such as liquid packer techniques and a new chapter devoted to relief well design and operationsImproves on both offshore and onshore operations with expanded material and photos on special conditions, challenges, and control procedures throughout the entire cycle of the well

  • av Nils J. (Stanford University) Nilsson
    1 041

  • av Mark Jason Dominus
    1 151

    Most Perl programmers were originally trained as C and Unix programmers, so the Perl programs that they write bear a strong resemblance to C programs. However, Perl incorporates many features that have their roots in other languages such as Lisp. This title introduces powerful programming methods and shows how to improve everyday programs.

  • av Peter (Independent Consultant Smith
    1 627

    Valves are the components in a fluid flow or pressure system that regulate either the flow or the pressure of the fluid. They are used in the process industries, especially petrochemical. This book analyzes the use, construction, and selection of valves in a comprehensive manner. It covers environmentally-conscious equipment and practices.

  • av Reliability Strategy Leader<br>Ivara Corporation) Smith & Ricky (CMRP
    1 187

    Provides detailed explained processes for each phase of Lean Maintenance implementation providing examples, checklists and methodologies. This work is suitable for every plant and facility that is planning, or even thinking of adopting 'Lean' as their mode of operation.

  •  
    2 001

    Offers a comprehensive review of research in public economics over the years.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.