Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Linux Security Cookbook
  • Language: en
  • Pages: 335

Linux Security Cookbook

Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform ...

Optical Fiber Communications
  • Language: en
  • Pages: 376

Optical Fiber Communications

  • Type: Book
  • -
  • Published: 2012-12-02
  • -
  • Publisher: Elsevier

Optical Fiber Communications, Volume 1: Fiber Fabrication focuses on the science, engineering, and application of information transmission through optical fibers. This book discusses the materials and processes for fiber fabrication, fiber theory, design, and measurement, as well as passive components, cabling, active devices, systems, and applications. Organized into five chapters, this volume starts with an overview of the modified chemical vapor deposition (MCVD), the outside vapor deposition (OVD), and the vapor-phase axial deposition (VAD) processes. This text then explores the important development with respect to the drawing of glass fibers, particularly those that serve as optical waveguides in telecommunications applications. Other chapters discuss the progress in fiber strength from short-length research fibers to large quantities that give confidence in the manufacturability of high-strength, long-length fibers. The final chapter discusses the advances in the technologies of optical-fiber manufacture. This book is a valuable resource for process engineers, technicians, scientists, and optical fiber manufacturers.

Linux System Security
  • Language: en
  • Pages: 609

Linux System Security

On Linux security

Applied Electromagnetic Engineering for Advanced Materials from Macro- to Nanoscale
  • Language: en
  • Pages: 394

Applied Electromagnetic Engineering for Advanced Materials from Macro- to Nanoscale

Selected, peer reviewed papers from the 9th Japanese-Mediterranean Workshop on Applied Electromagnetic Engineering for Magnetic, Superconducting, Multifunctional and Nano Materials, July 5-8, 2015, Sofia, Bulgaria

Cumulated Index Medicus
  • Language: en
  • Pages: 1328

Cumulated Index Medicus

  • Type: Book
  • -
  • Published: 1996
  • -
  • Publisher: Unknown

None

Pub157, 2004 Sailing Directions (Enroute)
  • Language: en
  • Pages: 208

Pub157, 2004 Sailing Directions (Enroute)

Sailing Directions 157 (Enroute) covers the Coasts of Korea and China from the northern coast of North Korea, around South Korea, through the Yellow Sea, to Guangzhou in Southeast China. It is issued for use in conjunction with Sailing Directions 120 (Planning Guide) Pacific Ocean and Southeast Asia. Companion volumes are Sailing Directions 153, 154, 155, 158, and 159.

Handbook of Fiber Science and Technology Volume 2
  • Language: en
  • Pages: 408

Handbook of Fiber Science and Technology Volume 2

  • Type: Book
  • -
  • Published: 1993-01-18
  • -
  • Publisher: CRC Press

This text provides up-to-date coverage of both recently developed and potentially available fibers, emphasizing new applications. Highlighting preparation, properties, practical industrial uses and future research directions for high technology, this volume examines optical fibres, aramid and polyimide fibres for heat resistant applications, ceramic fibres, fibres with thermal adaptability and electrically conducting polymers for fibres.

ODROID Magazine
  • Language: en
  • Pages: 31

ODROID Magazine

Table of Contents 6 Dual and Triple Boot For ODROID-C2: Easily Switch Between Operating Systems On A Single ODROID 8 Setting Up Your XU4 As A General-Purpose Network Attached Storage (NAS) Device: Your Home Swiss Army Knife Server 16 The Amazing ODROID-VU8: A Portable All-In-One ODROID Touchscreen Tablet With 1024 x 768 Resolution 19 Buildroot: Now Available For ODROID-C0/C1/C1+ 20 Sky Force Reloaded: What Do We Love On A Shoot ‘Em Up? Bullet Hell! 20 HomeBridge Home Automation: Easily Integrate Your Home’s Technologies 21 Tap ’N’ Slash: Uncomplicated Slashing With Fast Reflexes 23 Linux Gaming: PPSSPP Speed Comparison 29 SmartPower2: Your Energy-Saving Best Friend 29 ODROID-C2 Power Consumption: A Simple Tweak That Will Work Wonders 30 Meet An ODROIDian: Richard Bown (@richard-g8jvm)

Molecular Biology of B-Cell and T-Cell Development
  • Language: en
  • Pages: 582

Molecular Biology of B-Cell and T-Cell Development

Despite the tremendous diversity of the cells of the hematopoietic system, they are all derived from common precursor cells that are generated in the fetus and persist into adult life. In this regard, Band T lymphocytes, which comprise the two arms of the antigen-specific and inducible immune system, though functionally very different, are descendants of the same stem cell precursor. In the past several years, we have witnessed an explosion of information regarding the process by which differentiation of B-and T-cells from stem cells occurs. This information, like the answers to most important biological questions, has come from multiple and diverse directions. Because all hematopoietic cell...

Hacking and Security
  • Language: en
  • Pages: 1144

Hacking and Security

Explore hacking methodologies, tools, and defensive measures with this practical guide that covers topics like penetration testing, IT forensics, and security risks. Key Features Extensive hands-on use of Kali Linux and security tools Practical focus on IT forensics, penetration testing, and exploit detection Step-by-step setup of secure environments using Metasploitable Book DescriptionThis book provides a comprehensive guide to cybersecurity, covering hacking techniques, tools, and defenses. It begins by introducing key concepts, distinguishing penetration testing from hacking, and explaining hacking tools and procedures. Early chapters focus on security fundamentals, such as attack vector...