Home | Amazing | Today | Tags | Publishers | Years | Search 
Prokaryotic Symbionts in Plants (Microbiology Monographs)
Prokaryotic Symbionts in Plants (Microbiology Monographs)

Endophytic prokaryotes can invade the tissue of the host plant without triggering defense reactions or disease symptoms. Instead, they promote the growth of the host plant due to their ability to fix atmospheric dinitrogen and/or to produce plant growth-promoting substances.

This Microbiology Monographs volume presents...

Mathematics As a Science of Patterns
Mathematics As a Science of Patterns
This book expounds a system of ideas about the nature of mathematics which Michael Resnik has been elaborating for a number of years. In calling mathematics a science he implies that it has a factual subject-matter and that mathematical knowledge is on a par with other scientific knowledge; in calling it a science of patterns he expresses his...
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. ...Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic...

Fiber Optic Sensors (Optical Science and Engineering)
Fiber Optic Sensors (Optical Science and Engineering)

This reference presents a comprehensive account of the recent advances and research in fiber optic sensor technology. It offers a progressive history of each sensor type as well as basic principles and fundamental building blocks for practical applications in the electrical aerospace, defense and manufacturing, smart structure, undersea...

Laser Space Communications
Laser Space Communications

Laser space communications is a hot topic among electrical engineers working for the government and in the defense industry, and this groundbreaking resource is the first to offer professionals a thorough, practical treatment of the subject. The book focuses on the feasibility of laser space communications between satellites, satellites and...

Open Government: Collaboration, Transparency, and Participation in Practice
Open Government: Collaboration, Transparency, and Participation in Practice

In a world where web services can make real-time data accessible to anyone, how can the government leverage this openness to improve its operations and increase citizen participation and awareness? Through a collection of essays and case studies, leading visionaries and practitioners both inside and outside of government share their...

FPGAs 101: Everything you need to know to get started
FPGAs 101: Everything you need to know to get started

FPGAs (Field-Programmable Gate Arrays) can be found in applications such as smart phones, mp3 players, medical imaging devices, and for aerospace and defense technology. FPGAs consist of logic blocks and programmable interconnects. This allows an engineer to start with a blank slate and program the FPGA for a specific task, for instance,...

Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age
Engineering Mega-Systems: The Challenge of Systems Engineering in the Information Age

With their ability to cross traditional boundaries and achieve a level of functionality greater than their component elements, mega-systems have helped corporations and government organizations around the world resolve complex challenges that they otherwise couldn’t address with stand-alone systems. Engineering Mega-Systems: The...

BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
BIOS Disassembly Ninjutsu Uncovered (Uncovered series)
Explaining security vulnerabilities, possible exploitation scenarios, and prevention in a systematic manner, this guide to BIOS exploitation describes the reverse-engineering techniques used to gather information from BIOS and expansion ROMs. SMBIOS/DMI exploitation techniques—including BIOS rootkits and computer...
Handbook of Wireless Networks and Mobile Computing
Handbook of Wireless Networks and Mobile Computing

The past five decades have witnessed startling advances in computing and communication technologies that were stimulated by the availability of faster, more reliable, and cheaper electronic components. The design of smaller and more powerful devices enabled their mobility, which is rapidly changing the way we compute and communicate. For...

Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange
Modeling & Simulation-Based Data Engineering: Introducing Pragmatics into Ontologies for Net-Centric Information Exchange

Data Engineering has become a necessary and critical activity for business, engineering, and scientific organizations as the move to service oriented architecture and web services moves into full swing. Notably, the US Department of Defense is mandating that all of its agencies and contractors assume a defining presence on the Net-centric...

Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)
Fw 200 Condor vs Atlantic Convoy: 1941-43 (Duel)

With the fall of France in 1940, Germany suddenly had the opportunity to strike at poorly guarded Allied convoys. The Luftwaffe pressed into service the Fw-200 Condor, a plane that had originally been designed as a civilian airliner and the first plane to fly non-stop from Berlin to New York in 1938. After various modifications, the Fw-200...

Result Page: 36 35 34 33 32 31 30 29 28 27 26 25 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy