Book picks similar to
ASM Handbook, Volume 18: Friction, Lubrication, and Wear Technology by ASM International
it-wikipedia
technical
all
books-wantex
The Art of Multiprocessor Programming
Maurice Herlihy - 2008
To leverage the performance and power of multiprocessor programming, also known as multicore programming, programmers need to learn the new principles, algorithms, and tools.The book will be of immediate use to programmers working with the new architectures. For example, the next generation of computer game consoles will all be multiprocessor-based, and the game industry is currently struggling to understand how to address the programming challenges presented by these machines. This change in the industry is so fundamental that it is certain to require a significant response by universities, and courses on multicore programming will become a staple of computer science curriculums.This book includes fully-developed Java examples detailing data structures, synchronization techniques, transactional memory, and more.Students in multiprocessor and multicore programming courses and engineers working with multiprocessor and multicore systems will find this book quite useful.
TCP/IP Illustrated, Volume 1: The Protocols
Kevin R. Fall - 2009
Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat
How Apollo Flew to the Moon
W. David Woods - 2007
This fascinating book traces what was a massive accomplishment right from the early launches through manned orbital spaceflights, detailing each step. Out of the battlefields of World War II came the gifted German engineers and designers who developed the V-2 rocket, which evolved into the powerful Saturn V booster that propelled men to the Moon. David Woods tells this exciting story, starting from America 's postwar astronautical research facilities. The techniques and procedures developed have been recognised as an example of human exploration at its greatest, demonstrating a peak of technological excellence.
Calculus [with CD]
Howard Anton - 1992
New co-authors--Irl Bivens and Stephen Davis--from Davidson College; both distinguished educators and writers.* More emphasis on graphing calculators in exercises and examples, including CAS capabilities of graphing calculators.* More problems using tabular data and more emphasis on mathematical modeling.
Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors
Charles Platt - 2012
You’ll learn what each one does, how it works, why it’s useful, and what variants exist. No matter how much you know about electronics, you’ll find fascinating details you’ve never come across before.Convenient, concise, well-organized, and precisePerfect for teachers, hobbyists, engineers, and students of all ages, this reference puts reliable, fact-checked information right at your fingertips—whether you’re refreshing your memory or exploring a component for the first time. Beginners will quickly grasp important concepts, and more experienced users will find the specific details their projects require.Unique: the first and only encyclopedia set on electronic components, distilled into three separate volumesIncredibly detailed: includes information distilled from hundreds of sourcesEasy to browse: parts are clearly organized by component typeAuthoritative: fact-checked by expert advisors to ensure that the information is both current and accurateReliable: a more consistent source of information than online sources, product datasheets, and manufacturer’s tutorialsInstructive: each component description provides details about substitutions, common problems, and workaroundsComprehensive: Volume 1 covers power, electromagnetism, and discrete semi-conductors; Volume 2 includes integrated circuits, and light and sound sources; Volume 3 covers a range of sensing devices.
The Linux Command Line Beginner's Guide
Jonathan Moeller - 2012
ABOUT THE AUTHORStanding over six feet tall, Jonathan Moeller has the piercing blue eyes of a Conan of Cimmeria, the bronze-colored hair a Visigothic warrior-king, and the stern visage of a captain of men, none of which are useful in his career as a computer repairman, alas.He has written the "Demonsouled" trilogy of sword-and-sorcery novels, and continues to write the "Ghosts" sequence about assassin and spy Caina Amalas, the "Computer Beginner's Guide" series of computer books, and numerous other works.
When Angels Fear
P.J. Mordant - 2020
But she cannot rest. A strange sleeping sickness stalks the village, and a young woman has disappeared. Why won't the police investigate? As events unfold, Emma becomes embattled yet again, compelled to fight for her life, against a deadly curse linked to a past about which she had no knowledge. She is the only one able to vanquish the evil, but doing so will entail confronting an horrific and all-too-familiar enemy.The question is, after all she's been through, will she be strong enough?
The Ashley Book of Knots
Clifford W. Ashley - 1944
Here are approximately 3900 different kinds, from simple hitches to "Marlingspike Seamanship." Mr. Ashley has included almost everything there is to know about them. Precisely named and classified (some new ones for the first time officially), they can be easily found in the big index. He tells when they appeared, something about their history, and what they are good for. Above all, Mr. Ashley gives explicit directions on how to tie them. He describes each step simply and clearly in the text and has penned right alongside some 7000 drawings to make it still more graphic. This book and a piece of cord will open a new and challenging world of practical adventure to readers of all ages. There are many distinctive features to this informal encyclopedia. Outstanding are the delightful sketches and illustrations by the author that enliven every page. Mr. Ashley, a prominent marine artist, is at his best here. Sailors have been the greatest experimenters with rope, but since they have no monopoly on the art, the author describes knots used in over ninety other occupations. These range alphabetically from Archer to Yachtsman, and aesthetically from Florist to Hangman. The forty-one chapters include knots classed under such general types as "Hooks, Beckets, and Toggles," "The Noose," and "Tricks and Puzzles." Mr. Ashley has devoted eleven years to writing this book, and it is based on forty years of looking for, trying out, and thinking up new knots. His drawings abound in humor and the text is full of colorful anecdotes. THE ASHLEY BOOK OF KNOTS will make a unique and permanent addition to any library.
The Hacker Playbook: Practical Guide To Penetration Testing
Peter Kim - 2014
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Tesla Papers
Nikola Tesla - 2000
Tesla's rare article, 'The Problem of Increasing Human Energy with Special Reference to the Harnessing of the Sun's Energy' is included. This lengthy article was originally publishing in the June 1900 issue of The Century Illustrated Monthly Magazine and it was the outline for Tesla's master blueprint for the world. Tesla's fantastic vision of the future, including wireless power, anti-gravity, free energy and highly advanced solar power. Also included are some of the papers, patents and material collected on Tesla at the Colorado Spring Tesla Symposiums. Tesla was the inventor of the radio before Marconi, and when he demonstrated wireless remote control to the US Navy in the late 1890s, they replied that it was too advanced! Tesla was an eccentric visionary and probably the greatest inventor who ever lived. His basic inventions power the world of today. What was his vision of tomorrow? Find out in The Tesla Papers.
Nightkill
F. Paul Wilson - 1997
he's one of the best at what he does--and what he does is kill people for a living. But it's a young man's game and he wants out.And his instincts are right. When Jake reluctantly agrees to go on one last hit, he's double-crossed, and ends up completely paralyzed. The mob thinks he's done a deal. But what they don't know is that a brilliant doctor has developed a dangerous and deadly new technique. And if he succeeds, Jack Nacht will not only walk away again--but might also get a shot at revenge.
Git Pocket Guide
Richard E. Silverman - 2013
It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks
The Essence of Okinawan Karate-Do
Shoshin Nagamine - 1991
This book is a precise and easily accessible pictorial guide to performance and perfection of traditional karate.The only book in English with photos of one of the great prewar masters demonstrating the proper execution of Okinawan karate, The Essence of Okinawan Karate-Do is a bridge between karate's legendary past and the practitioners of today. This intelligent and imaginative text explains the historical landmarks in the development of style, vividly outlines its leading forms and techniques, and recalls noted Okinawan karate men of the past, including the author's teachers Ankichi Arakaki, Choki Motobu, and Chotoku Kyan.
The Secret Journals of Adolf Hitler, Volume 1: The Anointed
A.G. Mogan
Presented as a personal journal, this is a fact-supported re-telling of a desperate existence, as viewed by Hitler, and tracks the points of pain that forged his beliefs. From a childhood of abuse and cheating death to an agonizing unrequited love to torturous years as a beggar in Vienna to finally finding his destiny. Enflamed by delusions, Hitler embraced the powers he believed guided his life. This is a story of dire happenstances that broke a mind and spirit, created beliefs that twisted innocence, ultimately morphing into a malicious brew that changed the world forever. This is the one story that's never been told.If you liked The Anointed, you will also like Volume 2, The Struggle.
With British Snipers to the Reich
C. Shore - 1988
Captain Shore’s enthusiasm for firearms and especially for rifles led him to take every possible opportunity to try out different weapons, ammunition and methods of shooting. His interest was combined with sound common sense, and he would never countenance a rumour about a particular weapon or incident unless he was able to confirm it for himself.As a result everything in this book is based on his personal experience. In World War II Captain Shore took part in the British landings at D-Day, and fought in Normandy and northern Europe. He came across many different weapons in varying condition, some of the worst being those used by the Dutch and Belgian resistance fighters. He was keen to learn from experienced snipers and then to train others, and he became an officer sniping instructor at the British Army of the Rhine Training Centre.He shares a wealth of first-hand knowledge of different rifles, pistols, machine guns, ammunition, telescopes, binoculars and all the equipment a sniper should carry. This is not only an account of sniping in World War II but also a guide to all aspects of sniping based on personal knowledge and experience in training and battle. Illustrated heavily with photos, pictures and other illustrations of snipers, their weapons and their tactics.