Posted by **tanas.olesya** at June 16, 2015

English | May 1989 | ISBN: 0946284857 | 160 Pages | PDF | 4 MB

Posted by **AvaxGenius** at March 29, 2017

English | PDF | 2017 | 208 Pages | ISBN : 3319562207 | 2.95 MB

This textbook provides an accessible introduction to the rich and beautiful area of hyperplane arrangement theory, where discrete mathematics, in the form of combinatorics and arithmetic, meets continuous mathematics, in the form of the topology and Hodge theory of complex algebraic varieties.

Posted by **leonardo78** at March 29, 2017

2010 | ISBN: 0073383155 | 816 pages | PDF | 10,6 MB

The History of Mathematics: An Introduction, 7th Edition, is written for the one- or two-semester math history course taken by juniors or seniors, and covers the history behind the topics typically covered in an undergraduate math curriculum or in elementary schools or high schools.

Posted by **arundhati** at March 29, 2017

2015 | ISBN-10: 1305269470 | 1296 pages | PDF | 43 MB

Posted by **thingska** at March 27, 2017

English | 1995 | ISBN: 058210081X | 366 Pages | EPUB | 11.58 MB

Posted by **interes** at March 27, 2017

English | 2011 | ISBN: 0857290177 | PDF | 307 pages | 2,2 MB

Posted by **AlenMiler** at March 27, 2017

English | 21 Mar. 2017 | ASIN: B06XRSBQ1D | 294 Pages | AZW3 | 27.04 MB

Posted by **thingska** at March 25, 2017

English | 2003 | ISBN: 0773525890 | 296 Pages | PDF | 41.49 MB

Posted by **leonardo78** at March 25, 2017

1966 | ISBN: 0070006563 | 317 pages | DJVU | 3,5 MB

This text is a rigorous introduction on an elementary level to the theory of analytic functions of one complex variable. At American universities it is intended to be used by first-year graduate and advanced undergraduate students.

Posted by **hill0** at March 25, 2017

English | 8 Nov. 2016 | ISBN: 1484222822 | 216 Pages | EPUB (True) | 2.8 MB

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy.