Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ordinary Differential Equations
Ordinary Differential Equations
Skillfully organized introductory text examines origin of differential equations, then defines basic terms and outlines general solution of a differential equation. Subsequent sections deal with integrating factors; dilution and accretion problems; linearization of first order systems; Laplace Transforms; Newton’s Interpolation Formulas,...
Curves and Singularities
Curves and Singularities
The object of this book is to introduce to a new generation of students an area of mathematics that has received a tremendous impetus during the last twenty years or so from developments in singularity theory.

The differential geometry of curves, families of curves and surfaces in Euclidean space has fascinated mathematicians and users
...
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
An Encyclopedia of Battles: Accounts of Over 1,560 Battles from 1479 B.C. to the Present
Essential details of every major battle on land and sea in recorded history, from the first battle of Megiddo in 1479 B.C. to the Grenada conflict in 1984. Included: strategic situations, roles played by political/military leaders, troop numbers and training, tactics and objectives, casualties and losses and military/political consequences. Index....
6502 assembly-language programming for Apple, Commodore, and Atari computers
6502 assembly-language programming for Apple, Commodore, and Atari computers

Instructs those who have already programmed in high-level languages in programming with the more powerful and versatile assembly or machine language.

...
Out of the Inner Circle: A Hacker's Guide to Computer Security
Out of the Inner Circle: A Hacker's Guide to Computer Security

This book tells you about many of the experiences and stories that were part of my life as a sixteen-year-old hacker. I've tried where possible to make references general, rather than specific, to avoid giving you the impression that a particular hacking approach or technique always works on a single type or class of computer system....

Algorithms in Combinatorial Design Theory (Mathematics Studies)
Algorithms in Combinatorial Design Theory (Mathematics Studies)
Recent years have seen an explosive growth in research in combinatorics and graph theory. One primary factor in this rapid development has been the advent of computers, and the parallel study of practical and efficient algorithms. This volume represents an attempt to...
Pascal Plus Data Structures, Algorithms, and Advanced Programming
Pascal Plus Data Structures, Algorithms, and Advanced Programming
Until recently there has not been much consensus among educators on what formal education is necessary for a computer professional. It has always been considered essential to have a great deal of mathematical knowledge, as \vell as an understanding of computer hardware. Software education, however, often consisted of the teaching...
Programming Languages and their Definition: Selected Papers (Lecture Notes in Computer Science) (v. 177)
Programming Languages and their Definition: Selected Papers (Lecture Notes in Computer Science) (v. 177)

The IBM Vienna Laboratory has made a significant contribution to the work on the semantic description of computer systems. Both the operational semantics descriptions ("VDL") and the later work on denotational semantics ("Meta-IV", "VEM") contain interesting scientific ideas. Partly because of the large...

Hackers: Heroes of the Computer Revolution
Hackers: Heroes of the Computer Revolution
Steven Levy's classic book explains why the misuse of the word "hackers" to describe computer criminals does a terrible disservice to many important shapers of the digital revolution. Levy follows members of an MIT model railroad club--a group of brilliant budding electrical engineers and computer innovators--from the late 1950s to...
C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Intel OEM Systems Handbook
Intel OEM Systems Handbook

The cover design is an abstract portrayal of Intel's computer systems products as the building blocks of systems development. The building blocks meld together, encompassing the heart of an open system, which is symbolized by the pyramid at the heart of the architecture. This melding or flexibility is the key Intel pres to the design...

A Century of Electrical Engineering and Computer Science at MIT, 1882-1982
A Century of Electrical Engineering and Computer Science at MIT, 1882-1982

The book's text and many photographs introduce readers to the renowned teachers and researchers who are still well known in engineering circles.

Electrical engineering is a protean profession. Today the field embraces many disciplines that seem far removed from its roots in the telegraph, telephone, electric...

unlimited object storage image
Result Page: 1 2 3 Next 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy