Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Color Atlas of Human Poisoning and Envenoming
Color Atlas of Human Poisoning and Envenoming
The field of medical toxicology can be simply divided into animal and human poisonings from animal, plant, or man-made sources. Even more precisely, toxinology is the study of poisoning and envenoming by biological organisms, and toxicology is the study of human poisoning from manmade sources. Living organisms, such as animals,...
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
The Syrian Social Nationalist Party: Its Ideology and History
The Syrian Social Nationalist Party: Its Ideology and History
The emergence of the Syrian Social Nationalist Party (SSNP) during the Syrian civil war as a military and political force has elicited interest and debate among observers and analysts of the Middle East. Long considered as irrevocably marginalized by decades of prohibition and persecution, the SSNP has over the last decade re-asserted itself as...
Practical Antenna Handbook
Practical Antenna Handbook
The Antenna Builder’s Bible – Updated and Better Than Ever!

Design and construct your own antennas with step-by-step instructions and plans. Joseph J. Carr’s Practical Antenna Handbook, Fourth Edition, is an update of the most popular book on antennas ever written. This empowering guide blends theoretical concepts that...

Staying Power : 30 Secrets Invincible Executives Use for Getting to the Top - and Staying There
Staying Power : 30 Secrets Invincible Executives Use for Getting to the Top - and Staying There

You have the talent, and you have the ambition—but you lack a specific career plan to get you to the top. Believe it or not, you’re right on track! “Do not map out your career” is the first of thirty surprising success secrets that you’ll discover in Staying Power. In this completely practical, often...

Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
Information Warfare: corporate attack and defence in a digital world (Computer Weekly Professional)
The idea for this book came out of a need to find a text for a unit in Information Warfare given to Doctor of Business Administration students. Most of the existing texts had a military flavour and so did not suit our task. Others concentrated on security aspects and assumed some level of knowledge in this area. What we wanted was a text that...
Information Warfare and Organizational Decision-Making
Information Warfare and Organizational Decision-Making
Organizations are among the most valuable and yet most fragile structures of our civilization. We rely on organizations to obtain information, to comprehend and process information, to accumulate and internalize information, to make decisions based in part on that information, and to execute those decisions. Organizations are ubiquitous because...
Design and Development of Aerospace Vehicles and Propulsion Systems: Proceedings of SAROD 2018 (Lecture Notes in Mechanical Engineering)
Design and Development of Aerospace Vehicles and Propulsion Systems: Proceedings of SAROD 2018 (Lecture Notes in Mechanical Engineering)
This book presents selected papers presented in the Symposium on Applied Aerodynamics and Design of Aerospace Vehicles (SAROD 2018), which was  jointly organized  by Aeronautical Development Agency (the nodal agency for the design and development of combat aircraft in India),  Gas-Turbine Research Establishment (responsible for...
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
Ancient Engineers' Inventions: Precursors of the Present (History of Mechanism and Machine Science)
This book describes inventions and designs of ancient engineers that are the precursors of the present. The ages mainly range from 300 B.C. to 1600 A.D. with some exceptions from before and after this period.

As for the very ancient ones, the book describes inventions (documented by archaeological finds mainly from Pompei, Ercolano and Stabia)...

Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Cryptography: A Very Short Introduction
Cryptography: A Very Short Introduction

We are surrounded by cryptography, from the ATM, where we withdraw cash, mobile phones, and the Internet, to workplace security systems that protect business secrets, and the civil and military codes that protect the skies above us.

In this fascinating introduction to how cryptography actually works, Fred Piper and Sean Murphy highlight...

unlimited object storage image
Result Page: 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy