You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The SSN Tarpon, a nuclear submarine, is attacked and sunk in the China Sea. Lieutenant Commander Rico Petrone, a Navigator, is suddenly transferred to the SSN Cardinalfish, whose mission is to find the Tarpon. The nefarious Chinese battle group intends to steal the weapons and technology from the Tarpon and to destroy the detected Cardinalfish. Tension and fear heighten as Petrone’s experiences, knowledge, and skills, along with his captain’s decisions, are put to the test and become critical to the survival of the Cardinalfish’s company as she attempts to escape the Chinese onslaught. The enemy battle group, believing they are invincible, uses a mysterious, new, and unconventional weapon pirated from the US military experimental weapons computer system. Petrone receives praise and admiration for his recommendations in avoiding the weapon and the numerous attacks. With Petrone navigating the way, can the Cardinalfish, facing insurmountable odds, rescue Tarpon survivors, identify the weapon, elude the battle group, and get home in time to prevent a war?
Kuwait City: Mahfuz Abood becomes an orphan during Desert Storm. He blames the United States for his parents’ death. Standing in front of his destroyed home, he meets and is taken in by a Pakistani terrorist named Mustafa, who over time, teaches him the ways of death and destruction. Now a grown man, he devises a plan to pay back the United States. He tortures a Greek oil tanker owner who is murdered after he signs his ship over to Mahfuz. The Russian Bratva is paid to steal a nuclear bomb from a Russian submarine graveyard. Once obtained, it is transported to an Indian port and placed in the ship’s number one center cargo tank. A cargo of heavy crude oil is loaded onboard the tanker, making the bomb inaccessible with the activation controls hidden on the ship’s main deck. The United States’ attention is diverted towards New York as the tanker sails into the Gulf of Mexico hidden behind an ominous hurricane. The target is Port Arthur, Texas. It is the number one port for the import and export of petroleum, chemicals, and natural gases. Will Mahfuz have his vengeance or will the United States prevent a major catastrophe?
This book is an introduction into digital design with the focus on using the hardware construction language Chisel. Chisel brings advances from software engineering, such as object-orientated and functional languages, into digital design.This book addresses hardware designers and software engineers. Hardware designers, with knowledge of Verilog or VHDL, can upgrade their productivity with a modern language for their next ASIC or FPGA design. Software engineers, with knowledge of object-oriented and functional programming, can leverage their knowledge to program hardware, for example, FPGA accelerators executing in the cloud.The approach of this book is to present small to medium-sized typical hardware components to explore digital design with Chisel.
SHORTLISTED FOR THE LOCUS AWARD 2018 Bob Howard's career in the Laundry, the secret British government agency dedicated to protecting the world from the supernatural, has involved brilliant hacking, ancient magic and combat with creatures of pure evil. Now the Laundry's existence has become public, and Bob is being trotted out on TV to answer pointed questions about elven asylum seekers. What neither Bob nor his managers have foreseen is that their organisation has earned the attention of a horror far more terrifying than any demon: a government looking for public services to privatise. There are things in the Laundry's assets that big business would simply love to get its hands on . . . Inch by inch, Bob Howard and his managers are forced to consider the truly unthinkable: a coup against the British government itself.
Vols. for 1963- include as pt. 2 of the Jan. issue: Medical subject headings.
Electronic Engineering and Computing Technology contains sixty-one revised and extended research articles written by prominent researchers participating in the conference. Topics covered include Control Engineering, Network Management, Wireless Networks, Biotechnology, Signal Processing, Computational Intelligence, Computational Statistics, Internet Computing, High Performance Computing, and industrial applications. Electronic Engineering and Computing Technology will offer the state of art of tremendous advances in electronic engineering and computing technology and also serve as an excellent reference work for researchers and graduate students working with/on electronic engineering and computing technology.