Mechanical Measurements by Thomas G. BeckwithMechanical Measurements by Thomas G. Beckwith

Mechanical Measurements

byThomas G. Beckwith, Roy D. Marangoni, John H. Lienhard, V

Paperback | August 7, 2006

Pricing and Purchase Info


Earn 1,000 plum® points

Prices and offers may vary in store

Out of stock online

Not available in stores


In the field of mechanical measurements, Mechanical Measurements continues to set the standard. With an emphasis on precision and clarity, the authors have consistently crafted a text that has helped thousands of students grasp the fundamentals of the field. Mechanical Measurements 6th edition  gives students a methodical, well thought-out presentation that covers fundamental issues common to all areas of measurement in Part One, followed by individual chapters on applied areas of measurement in Part Two. This modular format fits several different course formats and accommodates a wide variety of skill levels.
Title:Mechanical MeasurementsFormat:PaperbackDimensions:784 pages, 9.3 × 7.2 × 1.7 inPublished:August 7, 2006Publisher:Pearson EducationLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0201847655

ISBN - 13:9780201847659

Look for similar items by category:


Read from the Book

PrefaceWho Should Read This BookOver the last two decades, several publications appeared on the subject of computer viruses, but only a few have been written by professionals ("insiders") of computer virus research. Although many books exist that discuss the computer virus problem, they usually target a novice audience and are simply not too interesting for the technical professionals. There are only a few works that have no worries going into the technical details, necessary to understand, to effectively defend against computer viruses. Part of the problem is that existing books have little—if any—information about the current complexity of computer viruses. For example, they lack serious technical information on fast-spreading computer worms that exploit vulnerabilities to invade target systems, or they do not discuss recent code evolution techniques such as code metamorphism. If you wanted to get all the information I have in this book, you would need to spend a lot of time reading articles and papers that are often hidden somewhere deep inside computer virus and security conference proceedings, and perhaps you would need to dig into malicious code for years to extract the relevant details.I believe that this book is most useful for IT and security professionals who fight against computer viruses on a daily basis. Nowadays, system administrators as well as individual home users often need to deal with computer worms and other malicious programs on their networks. Unfortunately, security courses have very little training on computer virus protection, and the general public knows very little about how to analyze and defend their network from such attacks. To make things more difficult, computer virus analysis techniques have not been discussed in any existing works in sufficient length before.I also think that, for anybody interested in information security, being aware of what the computer virus writers have "achieved" so far is an important thing to know.For years, computer virus researchers used to be "file" or "infected object" oriented. To the contrary, security professionals were excited about suspicious events only on the network level. In addition, threats such as CodeRed worm appeared to inject their code into the memory of vulnerable processes over the network, but did not "infect" objects on the disk. Today, it is important to understand all of these major perspectives—the file (storage), in-memory, and network views—and correlate the events using malicious code analysis techniques.During the years, I have trained many computer virus and security analysts to effectively analyze and respond to malicious code threats. In this book, I have included information about anything that I ever had to deal with. For example, I have relevant examples of ancient threats, such as 8-bit viruses on the Commodore 64. You will see that techniques such as stealth technology appeared in the earliest computer viruses, and on a variety of platforms. Thus, you will be able to realize that current rootkits do not represent anything new! You will find sufficient coverage on 32-bit Windows worm threats with in-depth exploit discussions, as well as 64-bit viruses and "pocket monsters" on mobile devices. All along the way, my goal is to illustrate how old techniques "reincarnate" in new threats and demonstrate up-to-date attacks with just enough technical details.I am sure that many of you are interested in joining the fight against malicious code, and perhaps, just like me, some of you will become inventors of defense techniques. All of you should, however, be aware of the pitfalls and the challenges of this field!That is what this book is all about.What I CoverThe purpose of this book is to demonstrate the current state of the art of computer virus and antivirus developments and to teach you the methodology of computer virus analysis and protection. I discuss infection techniques of computer viruses from all possible perspectives: file (on storage), in-memory, and network. I classify and tell you all about the dirty little tricks of computer viruses that bad guys developed over the last two decades and tell you what has been done to deal with complexities such as code polymorphism and exploits. The easiest way to read this book is, well, to read it from chapter to chapter. However, some of the attack chapters have content that can be more relevant after understanding techniques presented in the defense chapters. If you feel that any of the chapters are not your taste, or are too difficult or lengthy, you can always jump to the next chapter. I am sure that everybody will find some parts of this book very difficult and other parts very simple, depending on individual experience.I expect my readers to be familiar with technology and some level of programming. There are so many things discussed in this book that it is simply impossible to cover everything in sufficient length. However, you will know exactly what you might need to learn from elsewhere to be absolutely successful against malicious threats. To help you, I have created an extensive reference list for each chapter that leads you to the necessary background information.Indeed, this book could easily have been over 1,000 pages. However, as you can tell, I am not Shakespeare. My knowledge of computer viruses is great, not my English. Most likely, you would have no benefit of my work if this were the other way around.What I Do Not CoverI do not cover Trojan horse programs or backdoors in great length. This book is primarily about self-replicating malicious code. There are plenty of great books available on regular malicious programs, but not on computer viruses.I do not present any virus code in the book that you could directly use to build another virus. This book is not a "virus writing" class. My understanding, however, is that the bad guys already know about most of the techniques that I discuss in this book. So, the good guys need to learn more and start to think (but not act) like a real attacker to develop their defense!Interestingly, many universities attempt to teach computer virus research courses by offering classes on writing viruses. Would it really help if a student could write a virus to infect millions of systems around the world? Will such students know more about how to develop defense better? Simply, the answer is no...Instead, classes should focus on the analysis of existing malicious threats. There are so many threats out there waiting for somebody to understand them—and do something against them.Of course, the knowledge of computer viruses is like the "Force" in Star Wars. Depending on the user of the "Force," the knowledge can turn to good or evil. I cannot force you to stay away from the "Dark Side," but I urge you to do so.© Copyright Pearson Education. All rights reserved.

Table of Contents

Preface xv

Part I Fundamentals of Mechanical Measurement


    1 The Process of Measurement: An Overview

    2 Standards and Dimensional Units of Measurement 
    3 Assessing and Presenting Experimental Data 
    4 The Analog Measurand: Time-Dependent Characteristics 
    5 The Response of Measuring Systems 
    6 Sensors 
    7 Signal Conditioning 
    8 Digital Techniques in Mechanical Measurements 
    9 Readout and Data Processing

Part II Applied Mechanical Measurements


    10 Measurement of Count, EPUT, Time Interval, and Frequency Measurement  of Count, Events per Unit Time, Time Interval, and Frequency 
    11 Displacement and Dimensional Measurement 
    12 Strain and Stress: Measurement and Analysis 
    13 Measurement of Force and Torque 
    14 Measurement of Pressure 
    15 Measurement of Fluid Flow 
    16 Temperature Measurements 
    17 Measurement of Motion 
    18 Acoustical Measurements

Part III Appendices

    A Standards and Conversion Equations

    B Theoretical Basis for Fourier Analysis

    C Number Systems

    D Some Useful Data

    E Stress and Strain Relationships 
         E.1 The General Plane Stress Situation 
         E.2 Direction and Magnitudes of Principal Stresses 
         E.3 Variation in Shear Stress with Direction 
         E.4 Shear Stress on Principal Planes 
         E.5 General Stress Equations in Terms of Principal Stresses 
         E.6 Mohr’s Circle for Stress 
         E.7 Strain at a Point

         F Statistical Tests of Least Squares Fits

    Answers to Selected Problems