The Impossible Engineers


Book Description

Chloe Masters’ world changes in a heartbeat and all she did was touch a doorknob. James Nightshade has been on Chloe’s mind since the day she met him. Arrogant and frustrating, she thought she had put him behind her when she chose Michael Slade. When the secret she is seeking leads to questions about the death of Nightshade’s former girlfriend, she has no chose but to bring him into the investigation. A move she will come to regret. Danger awaits them around every corner as they search for answers. In the end a choice will need to be made, but is Chloe strong enough to make it?




Impossible Engineering


Book Description

The Canal du Midi, which threads through southwestern France and links the Atlantic to the Mediterranean, was an astonishing feat of seventeenth-century engineering--in fact, it was technically impossible according to the standards of its day. Impossible Engineering takes an insightful and entertaining look at the mystery of its success as well as the canal's surprising political significance. The waterway was a marvel that connected modern state power to human control of nature just as surely as it linked the ocean to the sea. The Canal du Midi is typically characterized as the achievement of Pierre-Paul Riquet, a tax farmer and entrepreneur for the canal. Yet Chandra Mukerji argues that it was a product of collective intelligence, depending on peasant women and artisans--unrecognized heirs to Roman traditions of engineering--who came to labor on the waterway in collaboration with military and academic supervisors. Ironically, while Louis XIV and his treasury minister Jean-Baptiste Colbert used propaganda to present France as a new Rome, the Canal du Midi was being constructed with unrecognized classical methods. Still, the result was politically potent. As Mukerji shows, the project took land and power from local nobles, using water itself as a silent agent of the state to disrupt traditions of local life that had served regional elites. Impossible Engineering opens a surprising window into the world of seventeenth-century France and illuminates a singular work of engineering undertaken to empower the state through technical conquest of nature.




The Engineer


Book Description




The National Engineer


Book Description




The Sayings of Shigeo Shingo


Book Description

Here is a great introduction to the remarkable mind of Shigeo Shingo, indisputably one of the great forces in manufacturing. In this soft cover book, Dr. Shingo describes his approach to manufacturing improvements, developed and refined over the course of a brilliant career. He called it the Scientific Thinking Mechanism (STM). The Sayings of Shigeo Shingo leads you through the five stages of STM, with appropriate examples taken from notes Dr. Shingo collected during his consulting trips to American and Japanese plants. It shows how, in many cases, the most brilliant ideas are often so simple they're overlooked. Or they're dismissed because they seem ridiculous: - A Japanese plant, after first rejecting the idea as too silly, finds that unhulled rice is ideal for smoothing the rough surfaces on pressure-formed ebonite switches - Granville-Phillips, in Boulder, Colorado, reduced defects to zero in one process after Dr. Shingo suggested illuminating circuit boards from below to reduce errors involved in the insertion of diodes and resistors The Sayings of Shigeo Shingo is must reading for plant managers and engineers. It formalizes the powerful and creative way of thinking that Shingo himself used time and again to overcome problems that seemed virtually insurmountable.







Engineers' Bulletin


Book Description




International Conference on Computer Science and Software Engineering (CSSE 2014)


Book Description

CSSE2014 proceeding tends to collect the most up-to-date, comprehensive, and worldwide state-of-art knowledge on Computer Science and Software Engineering. All the accepted papers have been submitted to strict peer-review by 2–4 expert referees, and selected based on originality, significance and clarity for the purpose of the conference. The conference program is extremely rich, profound and featuring high-impact presentations of selected papers and additional late-breaking contributions. We sincerely hope that the conference would not only show the participants a broad overview of the latest research results on related fields, but also provide them with a significant platform for academic connection and exchange. The Technical Program Committee members have been working very hard to meet the deadline of review. The final conference program consists of 126 papers divided into 4 sessions.




Boys' Life


Book Description

Boys' Life is the official youth magazine for the Boy Scouts of America. Published since 1911, it contains a proven mix of news, nature, sports, history, fiction, science, comics, and Scouting.




Social Engineering Penetration Testing


Book Description

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques including email phishing, telephone pretexting, and physical vectors can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results. - Understand how to plan and execute an effective social engineering assessment - Learn how to configure and use the open-source tools available for the social engineer - Identify parts of an assessment that will most benefit time-critical engagements - Learn how to design target scenarios, create plausible attack situations, and support various attack vectors with technology - Create an assessment report, then improve defense measures in response to test results