Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
What We Could Have Done With the Money: 50 Ways to Spend the Trillion Dollars We've Spent on Iraq
The war in Iraq is not only controversial, it's also astronomically expensive. Now Rob Simpson answers the question many concerned Americans have been asking: Wasn't there some other way the government could have spent one trillion of our tax dollars?

What We Could Have Done with the Money presents 50 thought-provoking spending...

Encyclopedia of Space Science & Technology 2 Volume Set
Encyclopedia of Space Science & Technology 2 Volume Set

A comprehensive resource on the past, present, and future of space technology

Researchers in optics, materials processing, and telecommunications require a reference that can provide a quick study of a number of basic topics in space science. The two-volume Encyclopedia of Space Science and Technology represents an ambitious
...

Reed-Solomon Codes and Their Applications
Reed-Solomon Codes and Their Applications

Electrical Engineering/Communications/Information Theory "The Berlekamp article alone will make this book worth having." --David Forney, Vice President, Motorola Codex Reed-Solomon Codes and Their Applications Edited by Stephen B. Wicker, Georgia Institute of Technology and Vijay K. Bhargava, University of Victoria On the Voyager...

Application Theory of Petri Nets: 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011
Application Theory of Petri Nets: 32nd International Conference, PETRI NETS 2011, Newcastle, UK, June 20-24, 2011

This volume constitutes the proceedings of the 32nd International Conference on Applications and Theory of Petri Nets and Other Models of Concurrency (PETRI NETS 2011). The Petri Net conferences serve as annual meeting places to discuss the progress in the field of Petri nets and related models of concurrency. They provide a forum for...

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Unauthorised Access: Physical Penetration Testing For IT Security Teams

The first guide to planning and performing a physical penetration test on your computer's security

Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...

VSAT Networks
VSAT Networks
Now fully revised and updated, VSAT Networks continues to cover all of the essential issues involved with the installation and operation of networks of small earth stations called ‘Very Small Aperture Terminal’. VSATs are typically one to two meters in antenna reflector diameter and communicate with one another, or with a...
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Technologies and Systems for Access and Transport Networks (Artech House Mobile Communications)
Take command of core technologies at the heart of all telecommunications systems with the first book expressly designed to help you apply, reuse, and enhance building-block components from one generation of networks to the next. This unique problem-solver unravels the complexities behind such technologies as synchronization, multiple access,...
Location-Based Services: Fundamentals and Operation
Location-Based Services: Fundamentals and Operation
Location-based Services (LBSs) are mobile services for providing information that has been created, compiled, selected or filtered under consideration of the users’ current locations or those of other persons or mobile devices. Typical examples are restaurant finders, buddy trackers, navigation services or applications in the areas of mobile...
Solar System Moons: Discovery and Mythology
Solar System Moons: Discovery and Mythology

Starting from Mars outward this concise handbook provides thorough information on the satellites of the planets in the solar system. Each chapter begins with a section on the discovery and the naming of the planet’s satellites or rings. This is followed by a section presenting the historic sources of those names. The book contains tables...

Digital Video Hacks : Tips & Tools for Shooting, Editing, and Sharing
Digital Video Hacks : Tips & Tools for Shooting, Editing, and Sharing

Since the dawn of film, novices and experts have used quick-and-dirty workarounds and audiovisual tricks to improve their motion pictures, from home movies to feature films. Today, the tools have certainly changed, as have the quality and scope of the results. With digital video, the hacking possibilities are now limitless,...

Building Websites With Joomla!: A step by step tutorial to getting your Joomla! CMS website up fast
Building Websites With Joomla!: A step by step tutorial to getting your Joomla! CMS website up fast
This book is being written in a small village in Sachsen-Anhalt in Germany, among other places. I live in this village. There is no access to DSL here; there are no public WLAN hotspots, no UMTS, no large companies and no city noise.

My work consists of activities like lecturing, advising, listening, testing and trying, programming,
...
Ionosphere and Applied Aspects of Radio Communication and Radar
Ionosphere and Applied Aspects of Radio Communication and Radar
This book describes the main aspects of radio propagation due to different natural and manmade phenomena occurring in ionospheric plasma. It discusses the possibility of stable radio communication links based on local scattering at field-elongated plasma inhomogeneities including natural inhomogeneities as well as artificial inhomogeneities. The...
Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 7 6 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy