The data transmission owes its existence to the need to transmit data at greater or lesser distances over wire lines that are often sensitive to interference. The raison d'etre of any data transmis...więcej »
Ransomware is nothing more than a malicious program (malware) designed to block access to files or in some cases to the operating system, with this the attacker manages to affect one of the three p...więcej »
Now a day's rescue operation in the coal mine was treated as a dangerous task. Even if an explosion occurs it can't be easily known to the inside labors. After the explosion occurs when rescue work...więcej »
The increasing use of the Internet by the users in their daily routines highlights the great success of the Internet. The need for secure data transmission has become very essential. Attacks by hac...więcej »
The following applied project is focused on the improvement of the processes of processes of brass and automotive painting in the workshop Brujo Cars located in the north of Bogota. The problem tha...więcej »
This study was aimed at improving the road noise performance of a detailed FE model representing a project vehicle. This study contains a comprehensive literature research implicating the influence...więcej »
As long as there have been computers, there has been a desire to integrate one's thoughts directly with them. As the technology progressively comes into contact with human users, new challenges ...więcej »
This book deals about a highway street vehicle crash or impact happens when a vehicle slams into another, over speed, street condition etc. The main objective is to develop security applications in...więcej »
You don't need to be a trained soldier to fully appreciate this edition of IMPROVISED MUNITIONS BLACK BOOK. Originally created for soldiers in guerrilla warfare situations, this handbook demonst...więcej »
Women are fundamentally different to men and, when it comes to cybersecurity, one thing is certain…IF YOU’RE SHORT ON WOMEN YOU’RE LESS SAFE.Women matter in cybe...więcej »
Trains are unlikely to ever again run between Ennis and Kilkee. For what was a railway is now a disjointed succession of pieces linking not just places but in a way two worlds: one unhurried and...więcej »
Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequencesKey Features:więcej »
The Indian Motocycle Manufacturing Co. began producing motorcycles in Springfield, Massachusetts in 1901 and quickly became the world's largest manufacturer. While the Harley-Davidson WLA was the ...więcej »
This book covers various details regarding industrial fluid power like Introduction to hydraulics & pneumatics, Hydraulic pumps/motors/valves/actuators, Pneumatics cylinders/valves/motors, Circuit ...więcej »
TiO2 and CuO nanoparticles are investigated as potential additives to diesel fuel to reduce emissions and enhance engine performance. Various concentrations of nanofuels are examined under differen...więcej »
Nowadays, data security is playing a significant role in the communication system as the hackers between transmissions media are more. The level of security depends on the secret key according to t...więcej »
The constant evolution of new technologies has led to an interest in how information technology impacts entrepreneurship, for both the development of new technology and support for funding mecha...więcej »