Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ew 103, Tactical Battlefield communications Electronic Warfare
Ew 103, Tactical Battlefield communications Electronic Warfare
This is the third book in the EW 100 series. Like the two earlier books, it is based on the EW 101 series of tutorial articles in the Journal of Electronic Defense. However, this book focuses on the practical aspects of electronic warfare against enemy communications signals

The target audiences for this book, like the earlier two, are
...
Other Fronts, Other Wars?: First World War Studies on the Eve of the Centennial (History of Warfare)
Other Fronts, Other Wars?: First World War Studies on the Eve of the Centennial (History of Warfare)

Society for First World War Studies. It is a selection of papers from a conference held in Innsbruck in late September 2011.

The society began as a small-scale attempt to bring together an international group of postgraduate and postdoctoral students who work on the First World War in 2001. Over the years, the habit developed
...

Encyclopedia of Espionage, Intelligence and Security
Encyclopedia of Espionage, Intelligence and Security
In composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.

EEIS is not intended as a classical “spy book,” filled with
...
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))
Computer Security Fundamentals (Pearson IT Cybersecurity Curriculum (ITCC))

ONE-VOLUME INTRODUCTION TO COMPUTER SECURITY

 

Clearly explains core concepts, terminology, challenges, technologies, and skills

 

Covers today’s latest attacks and...

Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and...

Creating Games in C++ : A Step-by-Step Guide
Creating Games in C++ : A Step-by-Step Guide
Do you love video games? Ever wondered if you could create one of your own, with all the bells and whistles? It's not as complicated as you'd think, and you don't need to be a math whiz or a programming genius to do it. In fact, everything you need to create your first game, "Invasion of the Slugwroths," is included in this book and...
Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)
Resistance, Liberation Technology and Human Rights in the Digital Age (Law, Governance and Technology Series)

This book explains strategies, techniques, legal issues and the relationships between digital resistance activities, information warfare actions, liberation technology and human rights. It studies the concept of authority in the digital era and focuses in particular on the actions of so-called digital dissidents. Moving from the difference...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)
Java 2 Developer Exam Cram 2 (Exam Cram CX-310-252A and CX-310-027)

The Exam Cram Method of study focuses on exactly what you need to get certified now. In this book you'll learn how to:

  • Prepare for the Java 2 Developer essay exam

  • Design, program, and submit the exam's...

Radio Engineering for Wireless Communication and Sensor Applications (Artech House Mobile Communications Series)
Radio Engineering for Wireless Communication and Sensor Applications (Artech House Mobile Communications Series)
The word radio means techniques that are used in transmitting and receiving information or power in the atmosphere or free space, or in transmission lines utilizing electromagnetic waves—so-called radio waves—but also the equipment needed therein.

This book provides the reader with the basics in radio engineering, the
...
The History of Information Security: A Comprehensive Handbook
The History of Information Security: A Comprehensive Handbook

Information Security is usually achieved through a mix of technical, organizational and legal measures. These may include the application of cryptography, the hierarchical modeling of organizations in order to assure confidentiality, or the distribution of accountability and responsibility by law, among interested parties.

...

Handbook of Chemical and Biological Warfare Agents
Handbook of Chemical and Biological Warfare Agents
With terrorist groups expanding their weapons of destruction beyond bombs and bullets, chemical and biological warfare agents aren't merely limited to the battlefield anymore. In some cases, they are now being used on a new front: major metropolitan cities. And in the Handbook of Chemical and Biological Warfare Agents, emergency response...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy