Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Damage and Failure of Composite Materials
Damage and Failure of Composite Materials

Understanding damage and failure of composite materials is critical for reliable and cost-effective engineering design. Bringing together materials mechanics and modeling, this book provides a complete guide to damage, fatigue and failure of composite materials. Early chapters focus on the underlying principles governing composite damage,...

Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and...

Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
Configuring Cisco AVVID: Architecture for Voice, Video, and Integrated Data
AVVID (Architecture for Voice, Video, and Integrated Data) is a network architecture made up of hardware and software that transmits a company’s data such as e-mail, web traffic, file transfers, voice traffic, and video traffic over the same physical computer network. Imagine taking the three networks your...
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!
Cooperation in Wireless Networks: Principles and Applications: Real Egoistic Behavior Is to Cooperate!

Cooperation in Wireless Networks: Principles and Applications covers the underlying principles of cooperative techniques as well as several applications demonstrating the use of such techniques in practical systems. The work is written in a collaborative manner by several authors from Asia, America, and Europe. Twenty chapters introduce and...

Wireless Internet and Mobile Computing: Interoperability and Performance (Information and Communication Technology Series,)
Wireless Internet and Mobile Computing: Interoperability and Performance (Information and Communication Technology Series,)
This book describes the technologies involved in all aspects of a large networking system and how the various devices can interact and communicate with each other. Using a bottom up approach the authors demonstrate how it is feasible, for instance, for a cellular device user to communicate, via the all-purpose TCP/IP protocols, with a wireless...
Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Advanced Image Processing in Magnetic Resonance Imaging (Signal Processing and Communications)
Magnetic Resonance (MR) imaging produces images of the human tissues in a noninvasive manner, revealing the structure, metabolism, and function of tissues and organs. The impact of this image technique in diagnostic radiology is impressive, due to its versatility and flexibility in joining high-quality anatomical images with functional...
Foundations for Guided-Wave Optics
Foundations for Guided-Wave Optics

A classroom-tested introduction to integrated and fiber optics

This text offers an in-depth treatment of integrated and fiber optics, providing graduate students, engineers, and scientists with a solid foundation of the principles, capabilities, uses, and limitations of guided-wave optic devices and systems. In addition to...

10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy
10 Don'ts on Your Digital Devices: The Non-Techie's Survival Guide to Cyber Security and Privacy

In nontechnical language and engaging style, 10 Don’ts on Your Digital Devices explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and...

Introduction to Probability and Statistics for Engineers and Scientists, Fourth Edition
Introduction to Probability and Statistics for Engineers and Scientists, Fourth Edition

This updated text provides a superior introduction to applied probability and statistics for engineering or science majors. Ross emphasizes the manner in which probability yields insight into statistical problems; ultimately resulting in an intuitive understanding of the statistical procedures most often used by practicing engineers and...

Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

IT-Enabled Strategic Management: Increasing Returns for the Organization
IT-Enabled Strategic Management: Increasing Returns for the Organization
We live in an age in which the value of information and knowledge has far surpassed that
of physical goods. Information resources have become a key differentiator of successful
businesses. Information technology (IT) and information systems (IS) are now integrated
in almost every aspect of business, from planning to analysis and
...
Wireless Network Security (Signals and Communication Technology)
Wireless Network Security (Signals and Communication Technology)
Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the...
unlimited object storage image
Result Page: 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 117 116 115 114 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy