Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Vietnam War: The Definitive Illustrated History
The Vietnam War: The Definitive Illustrated History

Created in association with the Smithsonian Institution, this authoritative guide chronicles America's fight against Communism in southeast Asia during the 1960s and 1970s, and comprehensively explores the people, politics, events, and lasting effects of the Vietnam War.

Honoring those who served in the war at home or abroad,...

IT Security Risk Control Management: An Audit Preparation Plan
IT Security Risk Control Management: An Audit Preparation Plan

Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of information security and discover handy tools that hook security controls into business processes.

Information security is more than configuring firewalls, removing viruses, hacking machines, or setting passwords. Creating...

Handbook of Multisensor Data Fusion
Handbook of Multisensor Data Fusion

Multisensor data fusion is an emerging technology with important applications in both the military and civilian sectors, such as target recognition, robotics, medical diagnostics, and "smart" buildings. It draws on techniques from wide-ranging disciplines, including artificial intelligence, pattern recognition, and statistical...

Electromagnetic Compatibility Engineering
Electromagnetic Compatibility Engineering
Praise for Noise Reduction Techniques IN electronic systems

"Henry Ott has literally 'written the book' on the subject of EMC. . . . He not only knows the subject, but has the rare ability to communicate that knowledge to others."
—EE Times

Electromagnetic Compatibility Engineering is a...

Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
Introduction to Electronic Defense Systems, Second Edition (Artech House Radar Library)
In my government position I am responsible for military research and technology for the Italian armed forces. During my coordination work with the Western European Armament Group: Panel I1 (Research and Technology), discussions have often been of a highly technical nature. It is certainly easier to make management decisions with an adequate...
The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments
The Art of the Data Center: A Look Inside the World's Most Innovative and Compelling Computing Environments

Today, data centers are the beating hearts of the companies they serve. Data centers process billions of Internet transactions every day. It's therefore critical for companies and IT organizations to understand the state-of-the-art in data center design. Narrow aspects - such as cooling, wiring, or power usage - are often the subject of...

Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
EMI Protection for Communication Systems
EMI Protection for Communication Systems

In recent years, the protection of communication services operating in the same of adjacent channels has become more and more challenging. Communication systems need to be protected from natural and man-made interference. This practical reference provides a through understanding of how to protect communication systems from intentional and...

Decision Making and Programming
Decision Making and Programming

The problem of selection of alternatives or the problem of decision making in the modern world has become the most important class of problems constantly faced by business people, researchers, doctors and engineers. The fields that are almost entirely focused on conflicts, where applied mathematics is successfully used, are law, military...

Handbook of Database Security: Applications and Trends
Handbook of Database Security: Applications and Trends
Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based technologies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of...
Design of Hashing Algorithms (Lecture Notes in Computer Science)
Design of Hashing Algorithms (Lecture Notes in Computer Science)

Historically, computer security is related to both cryptography and access control in operating systems. Cryptography, although mostly applied in the military and diplomacy, was used to protect communication channels and storage facilities (especially the backups). In the seventies there was a breakthrough in cryptography - the...

Biometric Recognition: Challenges and Opportunities
Biometric Recognition: Challenges and Opportunities

Biometric recognition--the automated recognition of individuals based on their behavioral and biological characteristic--is promoted as a way to help identify terrorists, provide better control of access to physical facilities and financial accounts, and increase the efficiency of access to services and their utilization. Biometric...

Result Page: 31 30 29 28 27 26 25 24 23 22 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy