|
|
|
|
Mechanical Engineering Principles
Mechanical Engineering Principles offers a student-friendly introduction to core engineering topics
This book introduces mechanical principles and technology through examples and applications rather than theory. John Bird and Carl Ross do not assume any previous background in engineering studies, and as such this book can... | | Microsoft Office Access 2003: The Complete ReferenceThe Definitive Resource on Access 2003
CD-ROM contains quick reference section on Access 2003--plus sample database files that support the book's material
Scale mountains of data with a single application with the help of this comprehensive resource. Through detailed, step-by-step instructions, you'll learn how to design and... | | Wireless Sensor Network DesignsWireless Sensors are small, cheap, low maintenance and will revolutionize wireless communications.
’Wireless sensor networks’ is a rapidly growing discipline with new technologies emerging, new applications being developed and standards being finalized. Sensors and actuators allow for entirely new kinds of... |
|
Arctic Security in an Age of Climate Change
This is the first book to examine Arctic defense policy and military security from the perspective of all eight Arctic states. In light of climate change and melting ice in the Arctic Ocean, Canada, Russia, Denmark (Greenland), Norway, and the United States, as well as Iceland, Sweden, and Finland, are grappling with an emerging Arctic... | | Effectiveness of Air Force Science and Technology Program Changes
Under mandate of Section 253, Study and Report on
Effectiveness of Air Force Science and Technology
Program Changes, of the Fiscal Year 2002 National
Defense Authorization Act (Public Law 107-107; U.S.
Congress, 2001), the U.S. Air Force contracted with
the National Research Council (NRC) to conduct the
present study. In response,... | | Hacking Exposed WirelessSecure Your Wireless Networks the Hacking Exposed Way
Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute... |
|
Cases on Telecommunications And NetworkingDuring the past two decades, technological development related to telecommunication technologies has allowed organizations of all types and size to be able to develop effective networking applications in support of information management. Furthermore, telecommunication technologies combined with computer technology have created the foundation of... | | Information Assurance: Managing Organizational IT Security RisksWritten by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted... | | |
|
|
|
Result Page: 7 6 5 4 3 2 1 |