Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Finite Antenna Arrays and FSS
Finite Antenna Arrays and FSS

A periodic surface is an assembly of identical elements arranged in a one or two-dimensional array. Such surfaces have various effects on incident electromagnetic waves. Their applications range from antennas to stealth aircraft.This book discusses finite antenna arrays and how to minimize the radar cross section of these arrays.

...

Effectiveness of Air Force Science and Technology Program Changes
Effectiveness of Air Force Science and Technology Program Changes

Under mandate of Section 253, Study and Report on Effectiveness of Air Force Science and Technology Program Changes, of the Fiscal Year 2002 National Defense Authorization Act (Public Law 107-107; U.S. Congress, 2001), the U.S. Air Force contracted with the National Research Council (NRC) to conduct the present study. In response,...

A Fire in the Wilderness: The First Battle Between Ulysses S. Grant and Robert E. Lee
A Fire in the Wilderness: The First Battle Between Ulysses S. Grant and Robert E. Lee
The riveting account of the first bloody showdown between Ulysses S. Grant and Robert E. Lee—a battle that sealed the fate of the Confederacy and changed the course of American history. 

In the spring of 1864, President Lincoln feared that he might not be able to save the Union. The Army of
...
Assembly Language Step-by-step: Programming with DOS and Linux
Assembly Language Step-by-step: Programming with DOS and Linux

The bestselling guide to assembly language--now updated and expanded to include coverage of Linux.

This new edition of the bestselling guide to assembly programming now covers DOS and Linux! The Second Edition begins with a highly accessible overview of the internal operations of the Intel-based PC and systematically covers...

Hack Proofing Your Web Applications
Hack Proofing Your Web Applications
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality; one step further is to test it for security—attempt to break into it by finding some...
IBM(R) Websphere(R) Application Server: The Complete Reference
IBM(R) Websphere(R) Application Server: The Complete Reference
IBM is generally considered one of the most important software vendors, and this is
even more true in the e-business space. In fact, many would say that IBM is the most
influential vendor and has the best vision and product scope in spaces such as Web
application development, Java, middleware, and enterprise systems. This chapter
...
Computational Molecular Dynamics: Challenges, Methods, Ideas: Proceeding of the 2nd International Symposium
Computational Molecular Dynamics: Challenges, Methods, Ideas: Proceeding of the 2nd International Symposium

On May 21-24, 1997 the Second International Symposium on Algorithms for Macromolecular Modelling was held at the Konrad Zuse Zentrum in Berlin. The event brought together computational scientists in fields like biochemistry, biophysics, physical chemistry, or statistical physics and numerical analysts as well as computer scientists working on...

Outlook 2007: Beyond the Manual
Outlook 2007: Beyond the Manual
Many people use Outlook either by choice or by force, but few of them do more than scratch the surface of the personal information manager's many features. And after years of spending hours each day within Outlook, most users become at least proficient with its base features.

Outlook 2007: Beyond the Manual takes you to the next level,...

Professional Joomla! (Programmer to Programmer)
Professional Joomla! (Programmer to Programmer)
As a major force in the world of affordable, advanced web site deployment, Joomla! has become the most important noncommercial Content Management System (CMS) in the world. The number of Joomla! downloads and add-ons continues to grow at lightning pace, spurring the need for a resource that explores the diverse needs of professional Joomla!...
The Catherine Wheel: A Novel (FSG Classics)
The Catherine Wheel: A Novel (FSG Classics)

Jean Stafford’s third and final novel, The Catherine Wheel, is a mordant tour de force concerning the gradual disintegration of a woman under pressures both societal and self-imposed.

Katharine Congreve, a Boston society figure, is summering at her country house in Hawthorne, Maine, in the late 1930s, looking after the...

Bass Guitar for Dummies
Bass Guitar for Dummies
Shake the earth with deep, sonorous vibrations. Be the force that relentlessly drives the music. Rumble like the ominous thunder of an approaching storm. For you, it's not enough just to be heard; you need to be felt, too. You need to play bass guitar.

Imagine your favorite music without bass. It doesn't work, does it? The bass is...

Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy