Skip to main content

Elsevier Science

  • Methods of Foundation Engineering

    • 1st Edition
    • Z. Bažant
    • English
    Methods of Foundation Engineering covers the theory, analysis, and practice of foundation engineering, as well as its soil mechanics and structural design aspects and principles. The book is divided into five parts encompassing 21 chapters. Part A is of an introductory character and presents a brief review of the various types of foundation structures used in civil engineering and their historical development. Part B provides the theoretical fundamentals of soil and rock mechanics, which are of importance for foundation design. Part C deals with the design of the footing area of spread footings and discusses the shallow foundation methods. Part D describes the methods of deep foundations, while Part E is devoted to special foundation methods. Each chapter in Parts C to E starts with an introduction containing a synopsis of the matter being discussed and giving suggestions as to the choice of a suitable method of foundation. This is followed by a description of the methods generally used in practice. Simple analyses of structures, presented at the conclusion of each chapter, can be carried out by a pocket calculator. This book will prove useful to practicing civil and design engineers.
  • Entropic Invariants of Two-Phase Flows

    • 1st Edition
    • Eugene Barsky
    • English
    In this book, a new approach to the theory and practice of two-phase systems based on a global invariant – entropy, – and other invariants is formulated and experimentally confirmed.
  • Geothermal Resources: An Energy Alternative

    • 1st Edition
    • H.K. Gupta
    • English
    Developments in Economic Geology, 12: Geothermal Resources: An Energy Alternative focuses on the consideration of geothermal resources as alternative energy sources. The publication first elaborates on the energy outlook, basic concepts, and heat transfer. Discussions focus on temperature, heat, and its storage, heat conduction, radiation, and convection, temperatures within the earth and heat flow, volcanoes and plate tectonics, geothermal resource assessment for the U.S., and recoverability from U.S. geothermal resources. The text then ponders on geothermal systems and resources, exploration techniques, and assessment and exploitation. Concerns cover drilling technology, reservoir physics and engineering, geological and hydrological techniques, geochemical techniques, and types of geothermal systems. The book takes a look at the world-wide status of geothermal resource utilization and the Cerro Prieto geothermal field in Mexico, including geothermal manifestations, transportation of steam, and environmental factors and waste disposal. The publication is a valuable reference for alternative energy experts and researchers interested in geothermal energy resources.
  • Data Analysis Methods in Physical Oceanography

    • 3rd Edition
    • Richard E. Thomson + 1 more
    • English
    Data Analysis Methods in Physical Oceanography, Third Edition is a practical reference to established and modern data analysis techniques in earth and ocean sciences. Its five major sections address data acquisition and recording, data processing and presentation, statistical methods and error handling, analysis of spatial data fields, and time series analysis methods. The revised Third Edition updates the instrumentation used to collect and analyze physical oceanic data and adds new techniques including Kalman Filtering. Additionally, the sections covering spectral, wavelet, and harmonic analysis techniques are completely revised since these techniques have attracted significant attention over the past decade as more accurate and efficient data gathering and analysis methods.
  • Personal Computer Local Networks Report

    • 1st Edition
    • Architecture Technology Architecture Technology Corpor
    • English
    Please note this is a Short Discount publication.Since the first microcomputer local networks of the late 1970's and early 80's, personal computer LANs have expanded in popularity, especially since the introduction of IBMs first PC in 1981. The late 1980s has seen a maturing in the industry with only a few vendors maintaining a large share of the market.This report is intended to give the reader a thorough understanding of the technology used to build these systems ... from cable to chips ... to ... protocols to servers. The report also fully defines PC LANs and the marketplace, with in–depth details on products, configurations, features, pricing, and service, plus lists of system components and features and vendor contact.
  • Computer Security in Financial Organizations

    • 1st Edition
    • J. Essinger
    • English
    This book provides a unique in–depth focus on how financial organizations and suppliers of computer security are currently addressing – in strategic terms – the problem of computer security.Written in an easy to read, non technical style the book is essential reading for all those involved in the management of this sensitive area, from computer security managers, financial directors and managers to analysts and designers in financial software houses.The report analyses the computer security requirements of a wide variety of organizations in the financial services sector, ranging from retail, commercial and investment banks to financial trading and investment management organizations.
  • Minisupercomputers

    • 1st Edition
    • Architecture Technology Architecture Technology Corpor
    • English
    Please note this is a Short Discount publication.A new category of product has been developed which needs to be considered by any purchaser of a high performance machine: minisupercomputers. Thoroughly revised and updated this years report compares in–depth, these computers to parallel processors, supercomputers, mainframe, superminicomputers and workstations. With an explosion of manufacturers announcing such computers, the choice and usage of these high performance systems is a key issue for the potential user.As the computer market continues to become more competitive, users continue their search for cost effective solutions to the point that most manufacturers are now providing alternative architectures for consideration by customers. The minisupercomputer technology is an international one with vendors such as BBN, Convex, IPS, AMT, and NCube filling market needs.Thoroughly revised and updated, this year's report is essential reading for any purchaser, or potential purchaser, of a high performance machine. By discussing the rapid increase in the use of minisupercomputers, as well as technology and market size, this report presents all the necessary information for a thorough understanding of these computer systems.
  • NETBIOS Report and Reference

    1991 Edition
    • 1st Edition
    • Architecture Technology Architecture Technology Corpor
    • English
    Please note this is a Short Discount publication.NETBIOS Report and Reference is essential reading for managers, implementors and serious users of PC local area networks. It covers NETBIOS and related technology issues.The report beings with a history and conceptual view of NETBIOS, and its relationship to the OSI Reference Model, continues with the command and packet structure of NETBIOS, details the server message block protocols, looks at various NETBIOS products from several vendors, and closes with a chapter on NETBIOS standards efforts.
  • The Third World Congress on Biosensors Abstracts

    1-3 June 1994, New Orleans, USA
    • 1st Edition
    • Abstracts
    • English
    Biosensors 94: The Third World Congress on Biosensors Abstracts focuses on the progress in the field of biosensors, including immuno-absorbent 'catch' system, surface plasmon resonance, and chemiluminescence. The selection first offers information on the development of a commercial multichannel clinical sensor chip; commercial development and application of biosensors; amperometric biosensors based on dehydrogenase/NAD and heterocyclic quinones; and enzyme-epoxy membrane based semi-automated glucose analyzing system. The text then takes a look at the orientation of antibody fragments to increase TIRF immunosensor efficiency and the development of latex-technology for specific DNA detection with surface plasmon resonance. The book elaborates on gas-phase biosensor for the determination of ethanol vapor; novel electrochemical gas phase biosensors for the detection of phenolic vapors; and the development of an immuno-absorbent 'catch' system for the detection of pesticides and pesticide analogues. The book also ponders on the kinetics of binding of immobilized antibodies under nonequilibrium, flow conditions; flow injection thin-layer cell immunosensor with chemiluminescent detection of peroxidase label; and new optical fiber sensor for detecting chemiluminescence and its application to immunoassay. The selection is a valuable source of data for researchers interested in biosensors.
  • Data Protection and Security for Personal Computers

    A manager's guide to improving the confidentiality, availability and integrity of data on Personal Computers and Local Area Networks
    • 1st Edition
    • R. Schifreen
    • English
    Learn how to improve the confidentiality, availability and integrity of information on your PC's and LAN's – easily and effectively.Written by the renowned international expert on PC security, Robert Schifreen, this unique management guide is written for every security conscious manager in an organization.Practic... comprehensive and easy to read, this guide will ensure that the reader is aware of everything concerned with maintaining the confidentiality, availability and integrity of data on personal computers and local area networks.UNIQUE FEATURES INCLUDE:– Totally PC and LAN specific– Practical tips and guidance– Comprehensive coverage of the topic– Unique action sheets for immediate implementation– Step–by– step coverage, easy to read, with limited technical jargonWHO SHOULD READ THIS GUIDE:– PC support managers, security managers, IT managers, sales and marketing managers, personnel officers, financial directors and all those responsible for corporate data.– Senior managers who wish to ensure that data on their employees PC's is safe at all times.– Managers with little computing or security experience who wish to implement a security policy throughout an organization.Please note this is a Short Discount publication.