Book picks similar to
Switch-Mode Power Supplies Spice Simulations and Practical Designs by Christophe P. Basso
electronics
electronics-power-regulation-contro
engineering
i-have-it
Black Knight: Ritchie Blackmore
Jerry Bloom - 2006
Dubbed the 'man in black', guitarist Ritchie Blackmore found fame with Seventies rock giants Deep Purple, then walked away from them to create Rainbow, only to abandon them and form another band in 1997 - Blackmore's Night.
Essays in Science
Albert Einstein - 1934
That unfortunate situation began to change when Einstein published several of the papers and speeches contained in this book which explain the central core of the theory in clear and often beautiful language accessible to any interested reader.In addition to lucid explications of both the Special and General theories, Einstein holds forth on the principles of research, the nature of scientific truth, and the method of theoretical physics. He also offers acute analyses and appreciation of the work of such giants as Johannes Kepler, Isaac Newton, Clerk Maxwell, and Niels Bohr.
The Art of Electronics
Paul Horowitz - 1980
Widely accepted as the authoritative text and reference on electronic circuit design, both analog and digital, this book revolutionized the teaching of electronics by emphasizing the methods actually used by circuit designers -- a combination of some basic laws, rules of thumb, and a large bag of tricks. The result is a largely nonmathematical treatment that encourages circuit intuition, brainstorming, and simplified calculations of circuit values and performance. The new Art of Electronics retains the feeling of informality and easy access that helped make the first edition so successful and popular. It is an ideal first textbook on electronics for scientists and engineers and an indispensable reference for anyone, professional or amateur, who works with electronic circuits.
Transport Phenomena
R. Byron Bird - 1960
* Enhanced sections throughout text provide much firmer foundation than the first edition. * Literature citations are given throughout for reference to additional material.
Strength of Materials, Part 1 and Part 2
Stephen P. Timoshenko - 1983
1: Elementary Theory and Problems contains the essential material that is usually covered in required courses of strength of materials in our engineering schools. Strength of Materials - Part. 2: Advanced Theory and Problems contains the later developments that are of practical importance in the fields of strength of materials, and theory of elasticity. Complete derivations of problems of practical interest are given in most cases. The books are illustrated with a number of problems to which solutions are presented. In many cases, the problems are chosen so as to widen the field covered by the text and to illustrate the application of the theory in the solution of design problems.
Kubernetes Patterns: Reusable Elements for Designing Cloud-Native Applications
Bilgin Ibryam - 2019
These modern architectures use new primitives that require a different set of practices than most developers, tech leads, and architects are accustomed to. With this focused guide, Bilgin Ibryam and Roland Huß from Red Hat provide common reusable elements, patterns, principles, and practices for designing and implementing cloud-native applications on Kubernetes.Each pattern includes a description of the problem and a proposed solution with Kubernetes specifics. Many patterns are also backed by concrete code examples. This book is ideal for developers already familiar with basic Kubernetes concepts who want to learn common cloud-native patterns.You'll learn about the following pattern categories:Foundational patterns cover the core principles and practices for building container-based cloud-native applications.Behavioral patterns explore finer-grained concepts for managing various types of container and platform interactions.Structural patterns help you organize containers within a pod, the atom of the Kubernetes platform.Configuration patterns provide insight into how application configurations can be handled in Kubernetes.Advanced patterns cover more advanced topics such as extending the platform with operators.
Maybe I'm Bad: Poems and Thoughts
Amie James - 2019
It is an acquired taste, for those who do not mind profanity and dishevelled emotions.
Practical Electronics for Inventors
Paul Scherz - 1998
Instead, it tells you-and shows you-what basic and advanced electronics parts and components do, and how they work. Chock-full of illustrations, Practical Electronics for Inventors offers over 750 hand-drawn images that provide clear, detailed instructions that can help turn theoretical ideas into real-life inventions and gadgets.
Michael Jackson: The Visual Documentary
Adrian Grant - 1995
Illustrated with hundreds of photographs, this visual documentary of Michael Jackson presents all the facts and includes his records, concerts, videos and awards, his public appearances and performances, memorabilia and records you never knew existed.
Modern Vim: Craft Your Development Environment with Vim 8 and Neovim
Drew Neil - 2018
Integrate your editor with tools for building, testing, linting, indexing, and searching your codebase. Discover the future of Vim with Neovim: a fork of Vim that includes a built-in terminal emulator that will transform your workflow. Whether you choose to switch to Neovim or stick with Vim 8, you’ll be a better developer.A serious tool for programmers and web developers, no other text editor comes close to Vim for speed and efficiency. Make Vim the centerpiece of a Unix-based IDE as you discover new ways to work with Vim 8 and Neovim in more than 30 hands-on tips.Execute tasks asynchronously, allowing you to continue in Vim while linting, grepping, building a project, or running a test suite. Install plugins to be loaded on startup—or on-demand when you need them—with Vim 8’s new package support. Save and restore sessions, enabling you to quit Vim and restart again while preserving your window layout and undo history. Use Neovim as a drop-in replacement for Vim—it supports all of the features Vim 8 offers and more, including an integrated terminal that lets you quickly perform interactive commands. And if you enjoy using tmux and Vim together, you’ll love Neovim’s terminal emulator, which lets you run an interactive shell in a buffer. The terminal buffers fit naturally with Vim’s split windows, and you can use Normal mode commands to scroll, search, copy, and paste. On top of all that: Neovim’s terminal buffers are scriptable.With Vim at the core of your development environment, you’ll become a faster and more efficient developer.
The Piano Book: Buying Owning a New or Used Piano
Larry Fine - 1995
Hundreds of thousands of pianos are bought and sold each year, yet most people buy a piano with only the vaguest idea of what to look for as they make this major purchase. The Piano Book evaluates and compares every brand and style of piano sold in the United States. There is information on piano moving and storage, inspecting individual new and used pianos, the special market for Steinways, and sales gimmicks to watch out for. An annual supplement, sold separately, lists current prices for more than 2,500 new piano models.
Wastewater Engineering: Treatment and Reuse
George Tchobanoglous - 2002
This text contains a strong focus on advanced wastewater treatment technologies, including biological treatment processes, and stresses the reuse aspect of wastewater and biosolids.
Power Electronics: Circuits, Devices and Applications
Muhammad H. Rashid - 1988
This text covers the basics of emerging areas in power electronics and a broad range of topics such as power switching devices, conversion methods, analysis and techniques, and applications. Its unique approach covers the characteristics of semiconductor devices first, then discusses the applications of these devices for power conversions. Four main applications are included: flexible ac transmissions (FACTs), static switches, power supplies, dc drives, and ac drives. - New chapters - Including Ch. 9, Multilevel Inverters, Ch. 13, Flexible AC Transmission Systems, and Ch. 17, Gate Drive Circuits.', gives students the latest information available on these topics. - New sections throughout - Including Semiconductor Basics, State-Space Analysis of Regulators, Vector Controls, Stepper Motor Control and more, gives students the latest information available on these topics. - Well-written and easy-to-follow, helps students maintain interest in the text. - Numerous worked-out examples, demonstrates for students the applications of conversion techniques in design and analysis of converter cir
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks