 |
|
|
 RF Components and Circuits*A complete course in understanding and designing RF circuits *Practical design knowhow from a world-class author
A comprehensive introduction to designing and understanding RF circuits
RF Components and Circuits covers the practicalities of designing and building circuits, including fault-finding and use of test... |  |  Schrodinger's Rabbits: The Many Worlds of Quantum"Usually quantum fuzziness appears only in ultratiny arenas, on a scale smaller than a golf ball to the degree that the golf ball is smaller than Texas. But nowadays, in labs around the world, scientists are plotting to release quantum weirdness from its subatomic prison. Before too long, quantum news won't be just for the science section... |  |  Programmer's Ultimate Security DeskRefThe Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software... |
|
 Semantic Web for the Wo Ontologist: Effective Modeling in RDFS and OWLThe promise of the Semantic Web to provide a universal medium to exchange data information and knowledge has been well publicized. There are many sources too for basic information on the extensions to the WWW that permit content to be expressed in natural language yet used by software agents to easily find, share and integrate information. Until... |  |  Instant Boris Effects (VASST Instant)Boris plug-in applications, including Graffiti, FX, and Red, permit video editors to add titling, effects, compositing, and 3D capabilities to their nonlinear editing (NLE) systems. Documentation and training materials have been notoriously lacking for these applications. Instant Boris Effects is a complete guide for novice and intermediate users... |  |  Physical Security for IT"Michael has unquestionable knowledge about how organizations today are linking their systems across enterprise-wide networks and virtual private networks (VPNs), as well as increasing their exposure to customers, competitors, browsers, hackers, and physical threats to the facility equipment and network(s). This book will show you how each... |
|
 Information Warfare and Organizational Decision-MakingOrganizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because... |  |  Essential XUL ProgrammingStart building XUL-based applications with this introduction to XUL and its technologies With so many different programming languages and operating systems, developers have been clamoring for a single "meta-language" to develop user interfaces that are cross-platform and cross-device. Mozilla.org responded by creating... |  |  Information Operations PlanningInformation operations involve the use of military information and how it is gathered, manipulated, and fused. It includes such critical functions asintelligence, surveillance, reconnaissance, command and control, communications, and precision navigation. Separating myth from reality, this authoritative resource provides military professionals with... |
|
Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 24 23 |