Home | Amazing | Today | Tags | Publishers | Years | Search 
Behind the Berlin Wall: East Germany and the Frontiers of Power
Behind the Berlin Wall: East Germany and the Frontiers of Power

Few historical changes occur literally overnight, but on August 13 1961 eighteen million East Germans awoke to find themselves walled in by an edifice which was to become synonymous with the Cold War: the Berlin Wall.

This new history rejects traditional, top-down approaches to Cold War politics, exploring instead how the border
...

Exploiting Online Games: Cheating Massively Distributed Systems
Exploiting Online Games: Cheating Massively Distributed Systems

If you are a gamer, a game developer, a software security professional, or an interested bystander, this book exposes the inner workings of online-game security for all to see.

From the authors of the best-selling Exploiting Software, Exploiting Online Games takes a frank look at controversial security issues...

Immunology and Evolution of Infectious Disease
Immunology and Evolution of Infectious Disease

From HIV to influenza, the battle between infectious agents and the immune system is at the heart of disease. Knowledge of how and why parasites vary to escape recognition by the immune system is central to vaccine design, the control of epidemics, and our fundamental understanding of parasite ecology and evolution. As the first comprehensive...

Ad Hoc Mobile Wireless Networks: Protocols and Systems
Ad Hoc Mobile Wireless Networks: Protocols and Systems

The authoritative guide to the state of the art in ad hoc wireless networking.

  • Reflects the field's latest breakthroughs

  • Covers media access, routing, service discovery, multicasting, power conservation, transport protocol, and much...

Bridge For Dummies
Bridge For Dummies

Bridge, as any player will tell you, is simply the best card game ever. It’s challenging—each hand presents a different set of conditions you must figure out and solve. It's very social—you play with a partner and two opponents. And best of all—it's fun.

Bridge For Dummies, 2E gives you a...

Laser Space Communications
Laser Space Communications

Laser space communications is a hot topic among electrical engineers working for the government and in the defense industry, and this groundbreaking resource is the first to offer professionals a thorough, practical treatment of the subject. The book focuses on the feasibility of laser space communications between satellites, satellites and...

Open Government: Collaboration, Transparency, and Participation in Practice
Open Government: Collaboration, Transparency, and Participation in Practice

In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their...

FPGAs 101: Everything you need to know to get started
FPGAs 101: Everything you need to know to get started

FPGAs (Field-Programmable Gate Arrays) can be found in applications such as smart phones, mp3 players, medical imaging devices, and for aerospace and defense technology. FPGAs consist of logic blocks and programmable interconnects. This allows an engineer to start with a blank slate and program the FPGA for a specific task, for instance,...

Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age

With their ability to cross traditional boundaries and achieve a level of functionality greater than their component elements, mega-systems have helped corporations and government organizations around the world resolve complex challenges that they otherwise couldn’t address with stand-alone systems. Engineering Mega-Systems: The...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Fiber Optic Sensors (Optical Science and Engineering)
Fiber Optic Sensors (Optical Science and Engineering)

This reference presents a comprehensive account of the recent advances and research in fiber optic sensor technology. It offers a progressive history of each sensor type as well as basic principles and fundamental building blocks for practical applications in the electrical aerospace, defense and manufacturing, smart structure, undersea...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy