eBooks-it.org Logo
eBooks-IT.org Inner Image

Handbook eBooks Page 2

Download free Handbook eBooks Page 2

Project Scheduling

A Research Handbook
Project Scheduling Image
Our objectives in writing Project Scheduling: A Research Handbook are threefold: (1) Provide a unified scheme for classifying the numerous project scheduling problems occurring in practice and studied in the literature; (2) Provide a unified and up-to-date treatment of the state-of-the-art procedures developed for their solution; (3) Alert the reader to various important problems that are still in need of considerable research effort. Project Scheduling: A Research Handbook has been divided into four parts. Part I consists of three chapters on the scope and relevance of project scheduling, on the nature of project scheduling, and finally on the introduction of a unified scheme that will be used in subsequent chapters for the identification and class...

Handbook of Neural Computing Applications

Handbook of Neural Computing Applications Image
This book draws on the experience of each of the contributors, and covers such topics as neural networks design and development, cognitive science, neurophysiology, pattern recognition, control theory, multiprocessor design, and software and systems development. The applications which they address include robotics, avionics, machine vision, multisource data fusion, adaptive interfaces, and others....

iOS Hacker's Handbook

iOS Hacker's Handbook Image
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and discusses them all. The award-winning author team, experts in Mac and iOS security, examines the vulnerabilities and the internals of iOS to show how attacks can be mitigated. The book explains how the operating system works, its overall security architecture, and the security risks associated with it, as well as exploits, rootkits, and other payloads developed for it. Covers iOS security architecture, vulnerability hunting, exploit writing, and how iOS jailbreaks work Explores iOS enterprise and encryption,...

The Civil Engineering Handbook

The Civil Engineering Handbook Image
2nd Edition
First published in 1995, the award-winning Civil Engineering Handbook soon became known as the field's definitive reference. To retain its standing as a complete, authoritative resource, the editors have incorporated into this edition the many changes in techniques, tools, and materials that over the last seven years have found their way into civil engineering research and practice.The Civil Engineering Handbook, Second Edition is more comprehensive than ever. You'll find new, updated, and expanded coverage in every section. In fact, more than 1/3 of the handbook is new or substantially revised. In particular you'll find increased focus on computing re...

Process Automation Handbook

A Guide to Theory and Practice
Process Automation Handbook Image
This book distils into a single coherent handbook all the essentials of process automation at a depth sufficient for most practical purposes. The handbook focuses on the knowledge needed to cope with the vast majority of process control and automation situations. In doing so, a number of sensible balances have been carefully struck between breadth and depth, theory and practice, classical and modern, technology and technique, information and understanding. A thorough grounding is provided for every topic. No other book covers the gap between the theory and practice of control systems so comprehensively and at a level suitable for practicing engineers....



2007 - 2017 © eBooks-IT.org