Skip to main content

Books in Physical sciences and engineering

    • Progress in Heterocyclic Chemistry

      • 1st Edition
      • Volume 28
      • September 8, 2016
      • Gordon Gribble + 1 more
      • English
      • eBook
        9 7 8 0 0 8 1 0 0 7 6 1 7
      Progress in Heterocyclic Chemistry (PHC), Volume 28 is an annual review series commissioned by the International Society of Heterocyclic Chemistry (ISHC). Volumes in the series contain both highlights of the previous year’s literature on heterocyclic chemistry and articles on new and developing topics of particular interest to heterocyclic chemists. The highlight chapters in Volume 28 are all written by leading researchers and constitute a systematic survey of the important original material reported in the literature of heterocyclic chemistry during 2015. Additional articles in this volume include Semi-conjugated Heteroaromatic Rings and beta-Lactam Chemistry. As with previous volumes in the series, Volume 28 will enable academic and industrial chemists, and advanced students, to keep abreast of developments in heterocyclic chemistry in a convenient way.
    • New Fluorinated Carbons: Fundamentals and Applications

      • 1st Edition
      • September 8, 2016
      • Olga V. Boltalina + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 7 9 8
      • eBook
        9 7 8 0 1 2 8 0 3 5 0 2 3
      New Fluorinated Carbons: Fundamentals and Applications is the second volume in Alain Tressaud’s Progress in Fluorine Science series. This volume provides an overview of cutting-edge research and emerging applications using new fluorinated carbon materials such as fullerenes, carbon nanotubes, polycyclic aromatic molecules, carbon nanofibers, and graphenes. Edited by recognized experts Olga Boltalina and Tsuyoshi Nakajima, this book includes valuable chapters on syntheses, structure analyses, and chemical and physical properties of fluorinated carbons written by leaders in each respective field. The work also explores the diverse practical applications of these functional materials—from energy storage and energy conversion devices to molecular electronics and lubricants.
    • Data Hiding Techniques in Windows OS

      • 1st Edition
      • September 8, 2016
      • Nihad Ahmad Hassan + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 4 9 0
      • eBook
        9 7 8 0 1 2 8 0 4 4 9 6 4
      "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employed for concealing data object from the human eye and/or the investigation. As a practitioner in the Digital Age, I can see this book siting on the shelves of Cyber Security Professionals, and those working in the world of Digital Forensics – it is a recommended read, and is in my opinion a very valuable asset to those who are interested in the landscape of unknown unknowns. This is a book which may well help to discover more about that which is not in immediate view of the onlooker, and open up the mind to expand its imagination beyond its accepted limitations of known knowns." - John Walker, CSIRT/SOC/Cyber Threat Intelligence Specialist Featured in Digital Forensics Magazine, February 2017 In the digital world, the need to protect online communications increase as the technology behind it evolves. There are many techniques currently available to encrypt and secure our communication channels. Data hiding techniques can take data confidentiality to a new level as we can hide our secret messages in ordinary, honest-looking data files. Steganography is the science of hiding data. It has several categorizations, and each type has its own techniques in hiding. Steganography has played a vital role in secret communication during wars since the dawn of history. In recent days, few computer users successfully manage to exploit their Windows® machine to conceal their private data. Businesses also have deep concerns about misusing data hiding techniques. Many employers are amazed at how easily their valuable information can get out of their company walls. In many legal cases a disgruntled employee would successfully steal company private data despite all security measures implemented using simple digital hiding techniques. Human right activists who live in countries controlled by oppressive regimes need ways to smuggle their online communications without attracting surveillance monitoring systems, continuously scan in/out internet traffic for interesting keywords and other artifacts. The same applies to journalists and whistleblowers all over the world. Computer forensic investigators, law enforcements officers, intelligence services and IT security professionals need a guide to tell them where criminals can conceal their data in Windows® OS & multimedia files and how they can discover concealed data quickly and retrieve it in a forensic way. Data Hiding Techniques in Windows OS is a response to all these concerns. Data hiding topics are usually approached in most books using an academic method, with long math equations about how each hiding technique algorithm works behind the scene, and are usually targeted at people who work in the academic arenas. This book teaches professionals and end users alike how they can hide their data and discover the hidden ones using a variety of ways under the most commonly used operating system on earth, Windows®. This is your hands-on guide to understand, detect and use today’s most popular techniques in hiding and exploring hidden data under Windows® machines, covering all Windows® versions from XP till Windows® 10. Starting with the Roman Emperor, Julius Caesar, and his simple cipher method to the surveillance programs deployed by NSA, to monitor communication and online traffic, this book will teach you everything you need to know to protect your digital data using steganographic & anonymity cryptographic techniques. Written in a simple style and requiring only basic knowledge of main Windows® functions, techniques are presented in a way to easily implement them directly on your computer.
    • Adsorption-Dryers for Divided Solids

      • 1st Edition
      • September 7, 2016
      • Jean-Paul Duroudier
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 7 9 6
      • eBook
        9 7 8 0 0 8 1 0 1 7 7 4 6
      Adsorption-Dryers for Divided Solids, part of the Industrial Equipment for Chemical Engineering set, provides practical applications and precise knowledge on global research, presenting an in-depth study of a variety of aspects within the field of chemical engineering. This volume discusses the principle of adsorption of gaseous impurities, practical data on adsorption, ion exchange and chromatography, the theory of drying, and the theory of imbibition. The author also provides methods needed for understanding the equipment used in applied thermodynamics in the hope of encouraging students and engineers to build their own programs. Chapters are complemented with appendices which provide additional information and associated references.
    • Liquid-Liquid and Solid-Liquid Extractors

      • 1st Edition
      • September 7, 2016
      • Jean-Paul Duroudier
      • English
      • Hardback
        9 7 8 1 7 8 5 4 8 1 7 8 9
      • eBook
        9 7 8 0 0 8 1 0 1 7 8 5 2
      Liquid-Liquid and Solid-Liquid Extractors, part of the Industrial Equipment for Chemical Engineering set, presents a concise and easy-to-use book on the calculation of differential liquid–liquid extraction, an investigation of equilibrium and material transfer between a fluid and a divided solid, and the fundamentals of liquid–solid extraction, among other strategies. The author also provides methods needed for the understanding the machinery used in applied thermodynamics in the hopes of encouraging students and engineers to construct the programs they need. Chapters are complemented with appendices which provide additional information and associated references.
    • Deep Shale Oil and Gas

      • 1st Edition
      • September 7, 2016
      • James G. Speight
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 0 9 7 4
      • eBook
        9 7 8 0 1 2 8 0 3 0 9 8 1
      Natural gas and crude oil production from hydrocarbon rich deep shale formations is one of the most quickly expanding trends in domestic oil and gas exploration. Vast new natural gas and oil resources are being discovered every year across North America and one of those new resources comes from the development of deep shale formations, typically located many thousands of feet below the surface of the Earth in tight, low permeability formations. Deep Shale Oil and Gas provides an introduction to shale gas resources as well as offer a basic understanding of the geomechanical properties of shale, the need for hydraulic fracturing, and an indication of shale gas processing. The book also examines the issues regarding the nature of shale gas development, the potential environmental impacts, and the ability of the current regulatory structure to deal with these issues. Deep Shale Oil and Gas delivers a useful reference that today’s petroleum and natural gas engineer can use to make informed decisions about meeting and managing the challenges they may face in the development of these resources.
    • Marine Gyro-Compasses and Automatic Pilots

      • 1st Edition
      • September 6, 2016
      • W. Burger + 1 more
      • J. H. Clough Smith + 1 more
      • English
      • Hardback
        9 7 8 0 0 8 0 1 0 3 1 7 4
      • Paperback
        9 7 8 1 4 8 3 1 2 2 8 2 3
      • eBook
        9 7 8 1 4 8 3 1 5 5 2 4 1
      Marine Gyro-Compasses and Automatic Pilots, A Handbook for Merchant Navy Officers: Volume Two, Automatic Pilots is a reference book describing automatic pilots and ancillary equipment that are normally used in British Merchant Ships. This handbook discusses the uses, types, and advantages of automatic steering, including the different kinds of equipment and compasses found in many merchant ships. The text explains in detail the components of the Automatic Two-unit Gyropilot, the Gyro-Hydraulic Steering Control, the Tiller Pilot, and the Gyro-Electric Steering Control (all Sperry brand). This book outlines how each device is operated and maintained, as well as any possible equipment troubles that can be encountered. This handbook addresses all the different types of the Brown Automatic Steering systems, the general arrangements, principles of operation, trouble-shooting, and maintenance of the equipment. For smaller ships, the Sperry Magnetic Compass Pilot can be used because a transmitting magnetic compass bypasses the need for a gyro compass required in bigger automatic pilots. This book describes the methods of operation of the compass through the use of a chain and sprocket drive, a hydraulic power unit, or electrically operated switches, thus saving on costs. This handbook also notes the components, controls, and working principles of the Arkas Automatic Pilot, and the types of ancillary equipment such as the Course Recorder and Off-Course Alarm. This handbook provides useful information for Merchant Navy Officers, officers and personnel of the British Merchant Fleet, as well as other officers of sea-going vessels.
    • Advances in GPU Research and Practice

      • 1st Edition
      • September 6, 2016
      • Hamid Sarbazi-Azad
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 7 3 8 6
      • eBook
        9 7 8 0 1 2 8 0 3 7 8 8 1
      Advances in GPU Research and Practice focuses on research and practices in GPU based systems. The topics treated cover a range of issues, ranging from hardware and architectural issues, to high level issues, such as application systems, parallel programming, middleware, and power and energy issues. Divided into six parts, this edited volume provides the latest research on GPU computing. Part I: Architectural Solutions focuses on the architectural topics that improve on performance of GPUs, Part II: System Software discusses OS, compilers, libraries, programming environment, languages, and paradigms that are proposed and analyzed to help and support GPU programmers. Part III: Power and Reliability Issues covers different aspects of energy, power, and reliability concerns in GPUs. Part IV: Performance Analysis illustrates mathematical and analytical techniques to predict different performance metrics in GPUs. Part V: Algorithms presents how to design efficient algorithms and analyze their complexity for GPUs. Part VI: Applications and Related Topics provides use cases and examples of how GPUs are used across many sectors.
    • Science and the Global Environment

      • 1st Edition
      • September 3, 2016
      • Alan McIntosh + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 1 7 1 2 8
      • eBook
        9 7 8 0 1 2 8 0 1 8 0 8 8
      Case Studies for Integrating Science and the Global Environment is designed to help students of the environment and natural resources make the connections between their training in science and math and today’s complex environmental issues. The book provides an opportunity for students to apply important skills, knowledge, and analytical tools to understand, evaluate, and propose solutions to today’s critical environmental issues. The heart of the book includes four major content areas: water resources; the atmosphere and air quality; ecosystem alteration; and global resources and human needs. Each of these sections features in-depth case studies covering a range of issues for each resource, offering rich opportunities to teach how various scientific disciplines help inform the issue at hand. Case studies provide readers with experience in interpreting real data sets and considering alternate explanations for trends shown by the data. This book helps prepare students for careers that require collaboration with stakeholders and co-workers from various disciplines.
    • Eleventh Hour CISSP®

      • 3rd Edition
      • September 3, 2016
      • Joshua Feldman + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 1 2 4 8 9
      • eBook
        9 7 8 0 1 2 8 1 1 3 7 7 6
      Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.