Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)
Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)

The Exam Cram Method of study focuses on exactly what you need to get certified now. In this book you'll learn how to:

  • Prepare for the Java 2 Developer essay exam

  • Design, program, and submit the exam's...

Radio Engineering for Wireless Communication and Sensor Applications (Artech House Mobile Communications Series)
Radio Engineering for Wireless Communication and Sensor Applications (Artech House Mobile Communications Series)
The word radio means techniques that are used in transmitting and receiving information or power in the atmosphere or free space, or in transmission lines utilizing electromagnetic waves—so-called radio waves—but also the equipment needed therein.

This book provides the reader with the basics in radio engineering, the
...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Handbook of Chemical and Biological Warfare Agents
Handbook of Chemical and Biological Warfare Agents
With terrorist groups expanding their weapons of destruction beyond bombs and bullets, chemical and biological warfare agents aren't merely limited to the battlefield anymore. In some cases, they are now being used on a new front: major metropolitan cities. And in the Handbook of Chemical and Biological Warfare Agents, emergency response...
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
Nuclear, Chemical, and Biological Terrorism: Emergency Response and Public Protection
This book provides guidance on measures that should be considered to protect human lives from terrorist activities involving nuclear, chemical, and biological weapons. It provides a historical summary of the development and use of these weapons, and continues with a detailed discussion of the types of radiation and warfare agents that are...
Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe's Future
Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe's Future

Although overshadowed by his contemporaries Adam Smith and David Hume, the Scottish philosopher Adam Ferguson strongly influenced eighteenth-century currents of political thought. A major reassessment of this neglected figure, Adam Ferguson in the Scottish Enlightenment: The Roman Past and Europe’s Future sheds new light on...

Career Warfare: 10 Rules for Building a Successful Personal Brand and Fighting to Keep It
Career Warfare: 10 Rules for Building a Successful Personal Brand and Fighting to Keep It

In Career Warfare, David F. D’Alessandro, the bestselling author of Brand Warfare, has written a business classic: an insightful and delightfully frank book about achieving professional success at a high level.

What really defines those who get ahead? Hard work and accomplishments will only get you so far. If...

Programming for Peace: Computer-Aided Methods for International Conflict Resolution and Prevention
Programming for Peace: Computer-Aided Methods for International Conflict Resolution and Prevention
From its beginning in the fifties of the last century, Artificial Intelligence was heavily supported by “defence agencies” in order to make “better warfare”.

But, if an AI researchers assumes that her/his discipline really can deliver results—otherwise s/he would be a dishonest researcher—then why not
...
Terrorism's Unanswered Questions (Praeger Security International)
Terrorism's Unanswered Questions (Praeger Security International)

Despite the growth of interest in the study of terrorism since 9/11, terrorism analysts rarely take a multidisciplinary approach to the subject. This leaves a number of terrorism's characteristics to be explored in new and unique ways. Terrorism's Unanswered Questions brings together scholars from the fields of criminology,...

Australia (Modern World Nations)
Australia (Modern World Nations)

Americans find Australia both exotic and familiar. If you travel in Australia, many things will make you think you are still at home. At other times you will feel as if you are in some sort of a fantasy land.

Americans can at once identify with a wealthy, English-speaking country with high living standards. Both Australia and the...
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
Surprise, Kill, Vanish: The Secret History of CIA Paramilitary Armies, Operators, and Assassins
From Pulitzer Prize finalist Annie Jacobsen, the untold USA Today bestselling story of the CIA's secret paramilitary units.


Surprise . . . your target. Kill . . . your enemy. Vanish . . . without a trace.


When
...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy