You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
@EOI: AEI rEOMETPEI Epigram of the Academy of Plato in Athens Electromagnetism, the science of forces arising from Amber (HAEKTPON) and the stone of Magnesia (MArNHLIA), has been the fOWldation of major scientific breakthroughs, such as Quantum Mechanics and Theory of Relativity, as well as most leading edge technologies of the twentieth century. The accuracy of electromagnetic fields computations for engineering purposes has been significantly improved during the last decades, due to the deVelopment of efficient computational techniques and the availability of high performance computing. The present book is based on the contributions and discussions developed during the NATO Advanced Study ...
"This book identifies key issues in the relationship between ICT and law, ethics, politics and social policy, drawing attention to diverse global approaches to the challenges posed by ICT to access rights"--Provided by publisher.
The censorship and surveillance of individuals, societies, and countries have been a long-debated ethical and moral issue. In consequence, it is vital to explore this controversial topic from all angles. Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications is a vital reference source on the social, moral, religious, and political aspects of censorship and surveillance. It also explores the techniques of technologically supported censorship and surveillance. Highlighting a range of topics such as political censorship, propaganda, and information privacy, this multi-volume book is geared towards government officials, leaders, professionals, policymakers, media specialists, academicians, and researchers interested in the various facets of censorship and surveillance.
In our hyper-connected digital world, cybercrime prevails as a major threat to online security and safety. New developments in digital forensics tools and an understanding of current criminal activities can greatly assist in minimizing attacks on individuals, organizations, and society as a whole. The Handbook of Research on Digital Crime, Cyberspace Security, and Information Assurance combines the most recent developments in data protection and information communication technology (ICT) law with research surrounding current criminal behaviors in the digital sphere. Bridging research and practical application, this comprehensive reference source is ideally designed for use by investigators, computer forensics practitioners, and experts in ICT law, as well as academicians in the fields of information security and criminal science.
"This 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world emphasized modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field of information science and technology"--Provided by publisher.
This book offers a broad panorama on recently achieved and potentially obtainable advances in electromagnetics with innovative IT technologies. Simple tutorial chapters introduce cutting edge technologies. These include parallel and distributed computing, object-oriented technologies, grid computing, semantic grids, agent based computing and service-oriented architectures. The book is a unique tool bridging the gap between IT and EM communities.
In chapters culled from popular and critically acclaimed Electromagnetic Compatibility Handbook, Electromagnetic Shielding provides a tightly focused, convenient, and affordable reference for those interested primarily in this subset of topics. Author Kenneth L. Kaiser demystifies shielding and explains the source and limitations of the approximations, guidelines, models, and rules-of-thumb used in this field. The material is presented in a unique question-and-answer format that gets straight to the heart of each topic. The book includes numerous examples and uses Mathcad to generate all of the figures and many solutions to equations. In many cases, the entire Mathcad program is provided.
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
Covering everything from signal processing algorithms to integrated circuit design, this complete guide to digital front-end is invaluable for professional engineers and researchers in the fields of signal processing, wireless communication and circuit design. Showing how theory is translated into practical technology, it covers all the relevant standards and gives readers the ideal design methodology to manage a rapidly increasing range of applications. Step-by-step information for designing practical systems is provided, with a systematic presentation of theory, principles, algorithms, standards and implementation. Design trade-offs are also included, as are practical implementation examples from real-world systems. A broad range of topics is covered, including digital pre-distortion (DPD), digital up-conversion (DUC), digital down-conversion (DDC) and DC-offset calibration. Other important areas discussed are peak-to-average power ratio (PAPR) reduction, crest factor reduction (CFR), pulse-shaping, image rejection, digital mixing, delay/gain/imbalance compensation, error correction, noise-shaping, numerical controlled oscillator (NCO) and various diversity methods.