Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Applied Engineering Failure Analysis: Theory and Practice

Buy

Applied Engineering Failure Analysis: Theory and Practice provides a point of reference for engineering failure analysis (EFA) cases, presenting a compilation of case studies covering a 35-year period, from the 1970s to 2012. This period spans the era from the time when slide rules were used routinely for engineering calculations, and when hard-copy photographs taken by film cameras were pasted onto typewritten sheets to make reports, to the present time when all these functions have become much less onerous through computer assistance.

The cases are drawn from such diverse fields as mechanical engineering, metallurgy, mining, civil/structural engineering, electrical power systems, and radiation damage; the last two topics are quite scarce in current publications. It includes theoretical content that deals with useful topics in basic theory, material properties, failure mechanisms, EFA methodology, and applications. It provides high-quality illustrations throughout, which greatly helps to promote the understanding of the failure characteristics described. This book offers an integrated approach that serves as a useful first reference in the above topics, for undergraduate and postgraduate students, as well as for practicing engineers.

The book provides a hands-on approach to EFA, which helps the user to develop an understanding of potential failure situations, to explore the consequences, and to better understand how to solve similar problems; it also helps users to develop their own techniques for most other engineering failure problems. The authors include a section on technical report writing, which will assist failure investigators in getting their findings across. They also present simple engineering calculations that may serve as illustrative examples, and typical problems and solutions are included at the end of each chapter.

(HTML tags aren't allowed.)

Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)
Implementing Cybersecurity: A Guide to the National Institute of Standards and Technology Risk Management Framework (Internal Audit and IT Audit)

The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management. This will be the case both for applications of the RMF in corporate training situations, as well as for any individual who wants to obtain specialized knowledge in organizational...

Excel Functions and Formulas Pocketbook
Excel Functions and Formulas Pocketbook
Geared toward the intermediate to advanced Excel 2016 user, this pocketbook provides explanations and context for many powerful Excel 2016 spreadsheet formulas and functions. Step-by-step instructions for many formula/function-related features such as using range names, and Excel's troubleshooting features. Focus on clarity, accuracy,...
Cloud Computing and Virtualization
Cloud Computing and Virtualization

The purpose of this book is first to study cloud computing concepts, security concern in clouds and data centers, live migration and its importance for cloud computing, the role of firewalls in domains with particular focus on virtual machine (VM) migration and its security concerns. The book then tackles design, implementation of...


Mobile Forensics: Advanced Investigative Strategies
Mobile Forensics: Advanced Investigative Strategies

Key Features

  • A straightforward guide to address the roadblocks face when doing mobile forensics
  • Simplify mobile forensics using the right mix of methods, techniques, and tools
  • Get valuable advice to put you in the mindset of a forensic professional, regardless of your career...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Python: Master the Art of Design Patterns
Python: Master the Art of Design Patterns

About This Book

  • Learn all about abstract design patterns and how to implement them in Python 3
  • Understand the structural, creational, and behavioral Python design patterns
  • Get to know the context and application of design patterns to solve real-world problems in software...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy