intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Physical information

Xem 1-20 trên 615 kết quả Physical information
  • Part 2 of ebook "Physically unclonable functions: Constructions, properties and applications" provides readers with contents including: Chapter 5 - PUF-based entity identification and authentication; Chapter 6 - PUF-based key generation; Chapter 7 - Conclusion and future work; Appendix A - Notation and definations from probability theory and information theory; Appendix B - Non-intrinsic PUF(-like) constructions;...

    pdf76p mothoiphong 28-06-2024 1 1   Download

  • Childhood cancer survivors (CCS) are subject to a substantial burden of treatment-related morbidity. Engaging in health protective behaviors and eliminating risk behaviors are critical to preventing chronic diseases and premature deaths. This study is aimed to provide updated information on currently smoking, physical inactivity, binge drinking patterns and associated factors among CCS using a nationwide dataset.

    pdf18p vikoch 27-06-2024 2 1   Download

  • In recent years, metals have been among the safest and most lucrative investments around, but they are not entirely risk free. Before you begin investing or trading in metals, you need authoritative information and proven investment strategies. You need Precious metals investing for Dummies.

    pdf362p zizaybay1104 29-05-2024 9 2   Download

  • Ebook Probabilistic & statistical methods in cryptology presents the following content: Chapter 1 classical polyalphabetic substitution ciphers; chapter 2 rsa and probabilistic prime number tests; chapter 3 factorization with quantum computers: shor’s algorithm; chapter 4 physical random-number generators; chapter 5 pseudo-random number generators; chapter 6 an information theory primer; chapter 7 tests for (pseudo-)random number generators; chapter 8 diffie-hellman key exchange; chapter 9 differential cryptanalysis; chapter 10 semantic security; chapter 11 algorithmic complexity; chapter 1...

    pdf159p zizaybay1103 29-05-2024 2 2   Download

  • Many times, security professionals need a reference for reviewing, developing, and implementing a security policy architecture. This text will walk the reader through the process for an effective policy architecture for a small, medium, or large enterprise. Whether the reader is a novice or an experienced security professional, this text will give examples and hints on how to review an existing security policy architecture and develop it from scratch.

    pdf360p zizaybay1103 29-05-2024 2 2   Download

  • Part 2 of ebook "Complex engineered systems: Science meets technology" provides readers with contents including: Chapter 8 - The dynamics of collaborative design, insights from complex systems and negotiation research; Chapter 9 - Modularity in the design of complex engineering systems; Chapter 10 - Engineering complex systems; Chapter 11 - Negotiation algorithms for collaborative design settings; Chapter 12 - Information theory – the bridge connecting bounded rational game theory and statistical physics;...

    pdf228p dongmelo 26-05-2024 4 2   Download

  • In this research, After I have realized some technological applications in the course of general physics laboratory II of the science teacher program, this research aims to examine the effects of the students' attitudes towards technology and the information of the communication technology (ICT) with the mixed method.

    pdf18p viarnault 25-04-2024 6 2   Download

  • Ebook "Principles of food chemistry (Fourth edition)" was designed to serve as an introductory text for courses in food chemistry as part of food science programs meeting the Institute of Food Technologists standards. The original concept for the preparation of this book was to present basic information on the composition of foods and the chemical and physical characteristics they undergo during processing, storage, and handling.

    pdf614p tracanhphuonghoa1007 22-04-2024 11 2   Download

  • Part 1 book "It governance - A managers guide to data security" includes content: Why is information security necessary the combined code; the turnbull report and sarbanes–oxley; organizing information security; information security policy and scope; the risk assessment and statement of applicability; external parties; asset management; human resources security, physical and environmental security, equipment security, communications and operations management, controls against malicious software (malware) and back-ups.

    pdf205p longtimenosee08 31-03-2024 3 1   Download

  • Ebook Hacking exposed: Linux security secrets solutions - Part 1 includes contents: Chapter 1 linux security overview; chapter 2 proactive measures and recovering from a break-in; chapter 3 mapping your machine and network getting in from the outside; chapter 4 social engineering, trojans, and other hacker trickery; chapter 5 physical attacks; chapter 6 attacking over the network; chapter 7 abusing the network itself.

    pdf268p longtimenosee05 31-03-2024 4 0   Download

  • Ebook How to cheat at deploying securing RFID: Part 1 includes contents: Chapter 1 Physics, Math, and RFID: Mind the Gap; Chapter 2 The Physics of RFID; Chapter 3 Working with RFID Tags; Chapter 4 Working with Interrogation Zones; Chapter 5 Working with Regulations and Standards; Chapter 6 Selecting the RFID System Design.

    pdf165p longtimenosee05 31-03-2024 3 0   Download

  • Ebook Maximum linux security (2nd edition): Part 1 includes contents: Chapter 1 introducing Linux security, chapter 2 physical security, chapter 3 installation issues, chapter 4 basic Linux system administration, chapter 5 password attacks, chapter 6 data attacks, chapter 7 malicious code, chapter 8 sniffers and electronic eavesdropping, chapter 9 scanners, chapter 10 spoofing.

    pdf367p longtimenosee05 31-03-2024 2 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 1 includes contents: Chapter 1 introduction; chapter 2 the evolution of physical security; chapter 3 security convergence: what is it anyway?; chapter 4 the challenges surrounding security convergence; chapter 5 IT governance and enterprise security policy; chapter 6 the evolution of global security solutions; chapter 7 positioning security: politics, industry, and business value.

    pdf251p longtimenosee05 31-03-2024 5 0   Download

  • Ebook Physical logical security convergence: Powered by enterprise security management - Part 2 includes contents: Chapter 8 the new security model: the trusted enterprise; chapter 9 ESM architecture; chapter 10 log collection; chapter 11 real-time event correlation, analysis, and response; chapter 12 event storage and forensic analysis; chapter 13 bridging the chinese wall; chapter 14 physical and logical access; chapter 15 intelligent video analytics; chapter 16 environmental sensors; chapter 17 protecting critical infrastructure: process control and SCADA; chapter 18 final thoughts.

    pdf342p longtimenosee05 31-03-2024 0 0   Download

  • In ebook "Dielectric properties of isolated clusters: Beam deflection studies" a broad range of state-of-the-art methods to determine properties of clusters are presented. The experimental setup and underlying physical concepts of these experiments are described. Furthermore, existing theoretical models to explain the experimental observations are introduced and the possibility to deduce structural information from measurements of dielectric properties is discussed.

    pdf102p tudohanhtau1006 29-03-2024 2 1   Download

  • Ebook "Dynamic pulsed-field-gradient NMR (Springer series in Chemical physics, Volume 110)" dealing with the basics, theory and applications of dynamic pulsed-field-gradient NMR NMR (PFG NMR), this book describes the essential theory behind diffusion in heterogeneous media that can be combined with NMR measurements to extract important information of the system being investigated.

    pdf364p tudohanhtau1006 29-03-2024 3 1   Download

  • Ebook "Essentials of food science (4th edition)" continues to use a multidisciplinary approach to expose the non-major food science student to the physical and chemical composition of foods. Additionally, food preparation and processing, food safety, food chemistry, and food technology applications are discussed in this single source of information.

    pdf499p tudohanhtau1006 29-03-2024 6 1   Download

  • Ebook "Practical aspects of computational chemistry I: An overview of the last two decades and current trends" is aimed at theoretical and computational chemists, physical chemists, materials scientists, and particularly those who are eager to apply computational chemistry methods to problem of chemical and physical importance. This book will provide valuable information to undergraduate, graduate, and PhD students as well as to established researchers.

    pdf687p coduathanh1122 27-03-2024 6 1   Download

  • Ebook "Primary explosives" is the first comprehensive overview of this topic. It serves as a single source for information about the properties, preparation, and uses of all relevant primary explosives. The first chapter provides background such as the basics of initiation and differences between requirements on primary explosives used in detonators and igniters. The authors then clarify the influence of physical characteristics on explosive properties, focusing on those properties required for primary explosives.

    pdf354p coduathanh1122 27-03-2024 2 1   Download

  • Ebook "Electron spin resonance and related phenomena in low-dimensional structures" is devoted to the discussion of the state-of-the-art of spin resonance in low dimensional structures, such as two-dimensional electron systems, quantum wires, and quantum dots. World leading scientists in the field report on recent advances and discuss open issues and perspectives. Frontiers and opportunities for spin resonance techniques, with particular emphasis on fundamental physics, nanoelectronics, spintronics and quantum information processing, are discussed.

    pdf276p coduathanh1122 27-03-2024 2 1   Download

CHỦ ĐỀ BẠN MUỐN TÌM

TOP DOWNLOAD
320 tài liệu
1228 lượt tải
ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
3=>0