|
|
|
|
Blog Theory: Feedback and Capture in the Circuits of Drive
The challenge of this book is thinking critically about media practices in a setting where they are fast, fun, and ubiquitous. As an avowedly engaged and political approach to thought, critical theory of any sort encounters challenges. Attempting to analyze and intervene in the present, it nonetheless adopts a backward gaze, an idea G.W.F.... | | Real World Microsoft Access Database Protection and SecurityMicrosoft Access is the most popular desktop database in the world today and its very popularity means that its security measures can be easily compromised. Real World Microsoft Access Database Security takes a different approach to all the other Access books in the market in that it focuses from the start on all the issues that... | | Wireless Internet Handbook: Technologies, Standards, and ApplicationsWireless applications are definitely the next big thing in communications. Millions of people around the world use the Internet every day—to stay in touch with remote locations, follow the stock market, keep up with the news, check the weather, make travel plans, conduct business, shop, entertain themselves, and learn. The logical next... |
|
Closed Circuit Television, Third Edition
Closed Circuit Television (CCTV) surveillance remains a growing industry in response to increased security threats, and whilst new developments have brought clearer images, digital recording and high speed data transmission, effective security systems still rely upon proper specification and installation by engineers with an in depth... | | Color Image Processing: Methods and ApplicationsOver the last two decades, we have witnessed an explosive growth in both the diversity of techniques and the range of applications of image processing. However, the area of color image processing is still sporadically covered, despite having become commonplace, with consumers choosing the convenience of color imaging over traditional grayscale... | | Secondary Surveillance Radar (Artech House Radar Library)Starting with a brief precis of the history of radar, this book concentrates on the principles of Secondary Radar, explaining its genesis during the Second World War, and its subsequent development as a significant feature of modern air travel.
This is followed by a comprehensive description of how Secondary Radar functions. It is clearly... |
|
|
Database Nation (Hardback)Forget the common cold for a moment. Instead, consider the rise of "false data syndrome," a deceptive method of identification derived from numbers rather than more recognizable human traits. Simson Garfinkel couples this idea with concepts like "data shadow" and "datasphere" in Database Nation, offering a... | | | | Wireless Network Security (Signals and Communication Technology)Wireless networks technologies have been dramatically improved by the popularity of third generation (3G) wireless networks, wireless LANs, Bluetooth, and sensor networks. However, security is a major concern for wide deployments of such wireless networks. The contributions to this volume identify various vulnerabilities in the physical layer, the... |
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 |