Home | Amazing | Today | Tags | Publishers | Years | Search 
Negative Refraction Metamaterials: Fundamental Principles and Applications
Negative Refraction Metamaterials: Fundamental Principles and Applications
Learn about the revolutionary new technology of negative-refraction metamaterials

Negative-Refraction Metamaterials: Fundamental Principles and Applications introduces artificial materials that support the unusual electromagnetic property of negative refraction. Readers will discover several classes of negative-refraction materials along with...

Cisco ASA Configuration (Networking Professional's Library)
Cisco ASA Configuration (Networking Professional's Library)
Over the past decade computer networks as well as the attacks against them have become increasingly complex. As information technology professionals we are faced with overcoming challenges every day, and learning new security concepts should not be one of them. I have known Richard, the author of this book, during this same time, and his gift of...
Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Managing Security Overseas: Protecting Employees and Assets in Volatile Regions
Written by a Certified Protection Professional (CPP), Certified Fraud Examiner (CFE), and FBI recognized subject matter expert, Managing Security Overseas: Protecting Employees and Assets in Volatile Regions details the dos and don’ts of protecting people and assets in hostile global settings. The author, Scott Alan Ast,...
JasperReports 3.5 for Java Developers
JasperReports 3.5 for Java Developers
Do you want to create easily understood, professional, and powerful reports from disordered, scattered data using a free, open source Java class library? If your answer is yes, this book on JasperReports is what you are looking for. JasperReports is the world's most popular embeddable Java open source reporting library, providing Java developers...
Ew 103, Tactical Battlefield communications Electronic Warfare
Ew 103, Tactical Battlefield communications Electronic Warfare
This is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals

The target audiences for this book, like the earlier two, are
...
International Security and the United States: An Encyclopedia (Praeger Security International)
International Security and the United States: An Encyclopedia (Praeger Security International)

Shaped by often very dramatic events, international security and the international system have changed significantly in recent years. The conclusion of the Cold War, the emergence of new political systems, the growth of significant threats such as terrorism, and the development of new security doctrines have driven global transformation. These...

Georg Cantor
Georg Cantor
One of the greatest revolutions in mathematics occurred when Georg Cantor (1845-1918) promulgated his theory of transfinite sets. This revolution is the subject of Joseph Dauben's important studythe most thorough yet writtenof the philosopher and mathematician who was once called a "corrupter of youth" for an innovation that is now a...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Mathematics As a Science of Patterns
Mathematics As a Science of Patterns
This book expounds a system of ideas about the nature of mathematics which Michael Resnik has been elaborating for a number of years. In calling mathematics a science he implies that it has a factual subject-matter and that mathematical knowledge is on a par with other scientific knowledge; in calling it a science of patterns he expresses his...
Prokaryotic Symbionts in Plants (Microbiology Monographs)
Prokaryotic Symbionts in Plants (Microbiology Monographs)

Endophytic prokaryotes can invade the tissue of the host plant without triggering defense reactions or disease symptoms. Instead, they promote the growth of the host plant due to their ability to fix atmospheric dinitrogen and/or to produce plant growth-promoting substances.

This Microbiology Monographs volume presents...

Java EE 5 Development with NetBeans 6
Java EE 5 Development with NetBeans 6

Java EE 5, the successor to J2EE, greatly simplifies the development of enterprise applications. The popular IDE, NetBeans, has several features that greatly simplify Java EE 5 development, and this book shows you how to make use of these features to make your Java programming more efficient and productive than ever before. With many features...

Result Page: 36 35 34 33 32 31 30 29 28 27 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy