|
|
|
|
Radar System Performance Modeling, Second EditionThis book addresses the needs of system analysts for radar models and analysis tools. It describes the basic principles of radar operation, how radar is configured and used in military and civilian systems, and how to analyze and model radar at the system level. The book presents and explains equations, computational methods, ... | | Rules of Play: Game Design Fundamentals
For hundreds of years, the field of game design has drifted along under the radar of culture, producing
timeless masterpieces and masterful time-wasters without drawing much attention to itself-without, in fact,
behaving like a "field" at all. Suddenly, powered by the big bang of computer technology, game design has... | | Wireless Communications: Algorithmic Techniques
This book introduces the theoretical elements at the basis of various classes of algorithms commonly employed in the physical layer (and, in part, in MAC layer) of wireless communications systems. It focuses on single user systems, so ignoring multiple access techniques. Moreover, emphasis is put on single-input single-output (SISO) systems,... |
|
|
CCIE Security Practice Labs (CCIE Self-Study)The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,... | | Digital Literacy: Tools and Methodologies for Information SocietyCurrently in a state of cultural transition, global society is moving from a literary society to digital one, adopting widespread use of advanced technologies such as the Internet and mobile devices. Digital media has an extraordinary impact on society s formative processes, forcing a pragmatic shift in their management and organization.... | | Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... |
|
|
|
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 |