Join us on a literary world trip!
Add this book to bookshelf
Grey
Write a new comment Default profile 50px
Grey
Subscribe to read the full book or read the first pages for free!
All characters reduced
Exercises of Nuclear and Matter Physics - cover

Exercises of Nuclear and Matter Physics

Simone Malacrida

Publisher: BookRix

  • 0
  • 0
  • 0

Summary

In this book, exercises are carried out regarding the following physics topics:
matter and solid state physics
nuclear and subnuclear physics
physics of particles and fundamental interactions
Available since: 04/24/2023.
Print length: 15 pages.

Other books that might interest you

  • Coding For Beginners - Learn the Techniques and Strategies to Become an Expert in Coding - cover

    Coding For Beginners - Learn the...

    Alexander Cane

    • 0
    • 0
    • 0
    Coding is a very important part of our reality today. It is one of the fabrics that enable the modern world to run efficiently. I know you'd like to learn to code, or at least you know someone who would like to learn to code. But, perhaps you are being held back by the phrase "coding is too hard." I remember a friend telling me this once when I told him of my intention to learn to code. He was like, "Are you serious, it is very hard. You'd actually have to be a genius to learn how to code. In fact, you'd have to be some kind of mad man". We both knew I was neither a genius nor a madman. Fast forward 2 years later, now I know to code. Not just that, I'm also teaching everyday men and women the fundamentals of the subject. 
    There are lots of job opportunities for coders and programmers today. In fact, coding jobs are growing at an astounding rate. If the Internet and data are the infrastructures, then coders are the construction workers. As long as there is infrastructure to be built, construction workers will always have work. It is believed that this trend will continue for a long time. Now is the time to position yourself to benefit from this trend. 
    In this book, you'll be learning the fundamentals of coding languages, how to become an expert in the shortest time possible, and much more. I have attempted to demystify coding because coding is not that difficult, and all you need is a good teacher. This book has been written with you (a beginner) in mind. So there is no unnecessary jargon or words that will fly over your head.
    Show book
  • Epidemics - cover

    Epidemics

    Hippocrates

    • 0
    • 0
    • 0
    The term "epidemic" is used to describe the spread of a disease or condition to a large number of people. The word "epidemic" is derived from the Greek word "epi", meaning "upon", and "demos", meaning "people". Hippocrates, a Greek physician who lived in the fourth century BC, was one of the first to use the term "epidemic". He used it to describe the spread of disease through a population. Read in English, unabridged.
    Show book
  • Scary Smart: Book Summary & Analysis - cover

    Scary Smart: Book Summary &...

    Briefly Summaries

    • 0
    • 0
    • 0
    This is a concise summary and analysis of Scary Smart, by Mo Gawdat.
     
    It is not the original book and is not affiliated with or endorsed by Mo Gawda.
     
    Ideal those seeking a quick and insightful overview.
     
    Scary Smart explores the rise of artificial intelligence and its potential to shape the future of humanity. The book discusses how AI is evolving at an unprecedented pace and the responsibility that humans have in ensuring it serves the greater good. With a focus on the ethical challenges and societal impacts, it provides a roadmap for navigating the complex relationship between humans and machines, offering insights on how we can guide AI development for a positive future.
    Show book
  • Tor And The Dark Art Of Anonymity - cover

    Tor And The Dark Art Of Anonymity

    Lance Henderson

    • 0
    • 0
    • 0
    Tired of being spied on by your ISP? The IRS? Nosy relatives on Facebook? This book is your baby. It`s the best online privacy book money can buy with every Tor Browser tip, trick, guide and secret metadata tricks not even the NSA knows about. It`s now yours for the taking (FREE!). No skills in hacking, penetration testing, kali linux or programming required! Plus, You`ll learn it in days, not years and for a fraction of the cost of a degree. 
    Get instant access to thousands of deep web hidden websites, portals and secret files plus access to the Hidden Wiki, all for free and in total anonymity. Not even the NSA will know who you are. 
    Most Big Data groups like Google, Facebook and Pinterest donot have your best interest at heart. They want your privacy curtailed so that you can be tracked left, right and center. Today`s written word will be used against you in the future. Minority Report and 1984 are just around the corner. Master anonymity, encryption and counter-surveillance in a weekend, not years. 
    Don`t let a tyrannical future bite you in your backside. It`s time to FIGHT BACK. Encrypt yourself online! 
    Other books tell you to install this or that and leave it at that. This book goes much deeper, delving into the very heart of invisibility, offline and on: how to create a new darknet persona and leave no electronic trail...with Tor or a hundred other apps. In essence, how to be anonymous without looking like you`re trying to be anonymous. On Android, Windows or Linux. Doesn`t matter. I go through them all in easy step by step fashion. One of the best ebooks to download and read you can ever get for the low price of FREE. You can`t lose!
    Show book
  • Data Science and Analytics Unleashed - Unlocking the Secrets in Data: A Journey from Gathering to Visualization - cover

    Data Science and Analytics...

    Sarah Thompson

    • 0
    • 0
    • 0
    "Data Science and Analytics Unleashed: Unlocking the Secrets in Data: A Journey from Gathering to Visualization" is a comprehensive guide that demystifies the complex world of data science and analytics, providing readers with a roadmap to navigate through the data landscape from start to finish.  
    Beginning with data gathering and cleaning fundamentals, the book lays a solid foundation for readers to understand the importance of data quality and integrity. It then progresses to data analysis, where readers learn how to apply statistical methods, machine learning algorithms, and predictive analytics techniques to extract meaningful insights from data.  
    What sets "Data Science and Analytics Unleashed" apart is its emphasis on practical application. The book is woven with real-world examples, case studies, and hands-on exercises, allowing readers to put theory into practice and tangibly develop their skills.  
    Whether readers are new to data science or seasoned professionals, this book is a valuable resource for mastering the art and science of extracting value from data. With its comprehensive coverage, practical insights, and actionable advice, "Data Science and Analytics Unleashed" is a must-read for anyone looking to unlock the secrets hidden within data and drive innovation in their organization.
    Show book
  • Cryptography and Data Security - Book 1: Proper Guide to Data Security in Communication Networks Cryptography and Data Security in Practice - cover

    Cryptography and Data Security -...

    Daniel Garfield

    • 0
    • 0
    • 0
    In an increasingly interconnected world, where data breaches and cyber threats loom at every corner, safeguarding sensitive information has become paramount. "Cryptography and Data Security: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice" serves as a comprehensive manual that demystifies the intricate world of cryptography and equips readers with the knowledge and tools to protect their data effectively. 
    Written by renowned experts in the field, this book takes a practical approach to data security, providing a solid foundation in cryptographic principles and techniques. It delves into the inner workings of encryption algorithms, cryptographic protocols, and secure communication systems, shedding light on how they can be implemented and deployed to fortify data defenses. 
    "Cryptography and Data Security: Proper Guide to Data Security in Communication Networks. Cryptography and Data Security in Practice" provides a wealth of knowledge and practical guidance. Arm yourself with the tools and expertise needed to navigate the evolving landscape of data security and safeguard sensitive information in today's interconnected world.
    Show book