eBooks-it.org Logo
eBooks-IT.org Inner Image

MIX eBooks Page 20

Download free MIX eBooks Page 20

Drilling Engineering

Drilling Engineering Image
Coauthored by a leading drilling engineering professor/researcher and a well-experienced drilling research advisor, Drilling Engineering explains the fundamentals and field practices in drilling operations. This textbook is an excellent resource for drilling engineers, drilling supervisors and managers, and petroleum engineering students. Topics covered include:***Drilling rig requirements, selection, and evaluation***Drilling fluids, including functions, types, selection criteria, evaluation, rheology***Drilling fluid hydraulics and design requirements***Drillstring mechanics***Drill bit mechanics, including types, operational requirements, optimization***Well control mechanics***Pore and fracture pressures prediction and application***Directional, ...

Slackware Linux Essentials

Slackware Linux Essentials Image
2nd Edition
This Book in designed to get you started with Slackware Linux operating system. It`s not meant to cover every single aspect of the distribution, but rather to show what it is capable of and give you a basic working knowledge of the system....

Management Information Systems

Managing the Digital Firm
Management Information Systems Image
13th Edition
Directed primarily toward undergraduate CIS/MIS college/university majors, this text also provides practical content to current and aspiring industry professionals. Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision making in an exciting and interactive manner. Note: This is the standalone book, if you want the book/access card order the ISBN below: 0133130789 / 9780133130782 Management Information Systems Plus MyMISLab with Pearson eText -- Access Card Package Package consists of: 0133050696...

Shellcoder's Programming Uncovered

Shellcoder's Programming Uncovered Image
How hackers, viruses, and worms attack computers from the Internet and exploit security holes in software is explained in this outline of antivirus software, patches, and firewalls that try in vain to withstand the storm of attacks. Some software's effectiveness exists only in the imaginations of its developers because they prove unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems (both Windows and Unix), and how to do away with security holes altogether. Unpublished advanced exploits and techniques in both C and Assembly languages are included....

Network Security Technologies

Network Security Technologies Image
2nd Edition
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security technologies from all relevant areas, resulting in a useful and easy-to-follow guide. This text is unique in that it classifies technologies as basic, enhanced, integrated, and architectural as a means of associating their functional complexities, providing added insight into their interrelationships. It introdu...



2007 - 2017 © eBooks-IT.org