You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This beginner's guide to cyclic voltammetry is designed to take you from novice to competent in a week. It bypasses all the mathematical proofs that often act as barriers to learning and begins with the practical information about experimental setup which will let you immediately start collecting and interpreting cyclic voltammograms. After the knowledge needed for gaining hands-on experience has been laid out, the underlying concepts that explain what happens at a molecular level during a cyclic voltammogram are described using easily understandable pictures and animations. This book is not meant to replace any of the go-to textbooks for electrochemistry, but to serve as a stepping stone on ones journey into the field, like a helpful postdoc in book form.
Thermodynamics and information touch theory every facet of chemistry. However, the physical chemistry curriculum digested by students worldwide is still heavily skewed toward heat/work principles established more than a century ago. Rectifying this situation, Chemical Thermodynamics and Information Theory with Applications explores applications dra
Some beg for forgiveness. Others claim innocence. At least three cheer for their favorite football teams. Death waits for us all, but only those sentenced to death know the day and the hour—and only they can be sure that their last words will be recorded for posterity. Last Words of the Executed presents an oral history of American capital punishment, as heard from the gallows, the chair, and the gurney. The product of seven years of extensive research by journalist Robert K. Elder, the book explores the cultural value of these final statements and asks what we can learn from them. We hear from both the famous—such as Nathan Hale, Joe Hill, Ted Bundy, and John Brown—and the forgotten, ...
None
None
A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Pytho...