Showing 201 - 220 results of 538 for search '"interceptions"', query time: 0.12s Refine Results
  1. 201

    Reading the enemy's mail : origins and development of U.S. Army tactical radio intelligence in World War II, European Theater of Operations. by Harley, Jeffrey S.

    Published 2015
    Table of Contents: “…TABLE OF CONTENTS; ABSTRACT; ACKNOWLEDGMENTS; LIST OF ILLUSTRATIONS; CHAPTER ONE-INTRODUCTION; World War I (1914-1918); Germany; United States; Inter-war period (1918-1938); Germany; United States; CHAPTER TWO-ORGANIZATION AND DOCTRINE; Organization and Doctrine-1940; Organization; Doctrine; Doctrine and Organization-Post 1940; Training; Doctrine and Organization-German Forces; CHAPTER THREE-WARTIME OPERATIONS; Intercept Operations; Direction Finding Operations; Traffic Analysis; Monitoring Allied Nets; Unit Case Studies; 3250th Signal Service Company (RI).…”
    Full text (Wentworth users only)
    Electronic eBook
  2. 202

    Mixed Models : Theory and Applications with R. by Demidenko, Eugene

    Published 2013
    Table of Contents: “…2.2.4 Profile log-likelihood functions -- 2.2.5 Dimension-reduction GLS estimate -- 2.2.6 Restricted maximum likelihood -- 2.2.7 Weight versus height (continued) -- 2.3 Balanced random-coefficient model -- 2.4 LME model with random intercepts -- 2.4.1 Balanced random-intercept model -- 2.4.2 How random effect affects the variance of MLE -- 2.5 Criterion for MLE existence -- 2.6 Criterion for the positive definiteness of matrix D -- 2.6.1 Example of an invalid LME model -- 2.7 Pre-estimation bounds for variance parameters -- 2.8 Maximization algorithms…”
    Full text (Wentworth users only)
    Electronic eBook
  3. 203

    Learning Python Web Penetration Testing : Automate Web Penetration Testing Activities Using Python. by Martorella, Christian

    Published 2018
    Table of Contents: “…; Automating basic extractions; Advanced SQLi exploiting; Summary; Chapter 7: Intercepting HTTP Requests; HTTP proxy anatomy; What is an HTTP proxy?…”
    Full text (Wentworth users only)
    Electronic eBook
  4. 204

    Learning zANTI2 for Android pentesting : dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 / Mir... by Vitula, Miroslav

    Published 2015
    Table of Contents: “…; ARP spoofing; MITM attacks through zANTI2; Logged requests; ZPacketEditor; SSL Strip; HTTP redirection; Replacing images; Capture/intercept downloads; Insert HTML; Summary; Index.…”
    Full text (Wentworth users only)
    Electronic eBook
  5. 205

    Sulfuric acid manufacture : analysis, control and optimization / by Matthew J. King, William G. Davenport, Michael S. Moats. by King, Matthew J.

    Published 2013
    Table of Contents: “…Maximum SO2 oxidation : heatup path-equilibrium curve intercepts -- 13. Cooling first catalyst bed exit gas -- 14. …”
    Full text (Wentworth users only)
    Electronic eBook
  6. 206

    Sulfuric acid manufacture : analysis, control and optimization / by Matthew J. King, William G. Davenport, Michael S. Moats. by King, Matthew J.

    Published 2013
    Table of Contents: “…Maximum SO2 oxidation : heatup path-equilibrium curve intercepts -- 13. Cooling first catalyst bed exit gas -- 14. …”
    Full text (Wentworth users only)
    Electronic eBook
  7. 207

    Learning Python Web Penetration Testing : Automate Web Penetration Testing Activities Using Python. by Martorella, Christian

    Published 2018
    Table of Contents: “…; Automating basic extractions; Advanced SQLi exploiting; Summary; Chapter 7: Intercepting HTTP Requests; HTTP proxy anatomy; What is an HTTP proxy?…”
    Full text (Wentworth users only)
    Electronic eBook
  8. 208

    Learning zANTI2 for Android pentesting : dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 / Mir... by Vitula, Miroslav

    Published 2015
    Table of Contents: “…; ARP spoofing; MITM attacks through zANTI2; Logged requests; ZPacketEditor; SSL Strip; HTTP redirection; Replacing images; Capture/intercept downloads; Insert HTML; Summary; Index.…”
    Full text (Wentworth users only)
    Electronic eBook
  9. 209

    Plant physics / Karl J. Niklas and Hanns-Christof Spatz. by Niklas, Karl J.

    Published 2012
    Table of Contents: “…Three transport laws -- Boundary layers -- Living in water versus air -- Passive diffusion of carbon dioxide in the boundary layer in air and in water -- Light interception and photosynthesis -- Absorption of light by chloroplasts -- Formulas for the effective light absorption cross section of some geometric objects -- Modeling light interception in canopies -- Phototropism -- Mechanoperception -- Thigmomorphogenesis -- Gravitropism -- Root growth, root anchorage, and soil properties. -- Plant Water Relations. …”
    Full text (Wentworth users only)
    Electronic eBook
  10. 210

    Radio Frequency Integrated Circuit Design. by Rogers, John (John W. M.)

    Published 2010
    Table of Contents: “…2.1 Introduction2.2 Noise; 2.2.1 Thermal Noise; 2.2.2 Available Noise Power; 2.2.3 Available Power from Antenna; 2.2.4 The Concept of Noise Figure; 2.2.5 The Noise Figure of an Amplifier Circuit; 2.2.6 Phase Noise; 2.3 Linearity and Distortion in RF Circuits; 2.3.1 Power Series Expansion; 2.3.2 Third-Order Intercept Point; 2.3.3 Second-Order Intercept Point; 2.3.4 The 1-dB Compression Point; 2.3.5 Relationships Between 1-dB Compression and IP3 Points; 2.3.6 Broadband Measures of Linearity; 2.4 Modulated Signals; 2.4.1 Phase Modulation; 2.4.2 Frequency Modulation.…”
    Full text (Wentworth users only)
    Electronic eBook
  11. 211

    Perspectives on Drug Use in the United States. by Segal, Bernard

    Published 2014
    Table of Contents: “…Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; Drug Laws and Drug Law Enforcement: A Review and Evaluation Based on 111 Years of Experience; Introduction; Opium Smoking; The Harrison Narcotic Act (1914); ""Tightening Up" the Harrison Act; The Economics of the Black Market; Closing the Borders to Smuggling; Cocaine and the Amphetamines; The Marijuana Tax Act (1937); Operation Intercept; Curbing Drug Production Abroad; Curbing U.S. …”
    Full text (Wentworth users only)
    Electronic eBook
  12. 212

    Celestial navigation for yachtsmen / Mary Blewitt. by Blewitt, Mary

    Published 2008
    Table of Contents: “…Cover; Copyright; Contents; The Theory; Heavenly Bodies; The Geographical Position; Declination; Hour Angle; The Zenith; The Horizon; Altitude; Zenith Distance; The Elevated Pole; Azimuth and Azimuth Angle; Great Circles; Universal Time; The Position Line; The Meridian Passage; Spherical Triangles; The Intercept; Sextant Altitude and True Altitude; Dip; Refraction; Semi-Diameter; Parallax; The Practice; Almanacs and Tables; A Sun Sight in Winter; Using the Sextant; Recording the Sights; Correcting the Data: Watch Time to UT; ; Sextant Altitude to True Altitude.…”
    Full text (Wentworth users only)
    Electronic eBook
  13. 213

    Computer-aided econometrics edited by David E.A. Giles.

    Published 2003
    Table of Contents: “…Kaashoek and Herman K. van Dijk -- Real-time forecasting with vector autoregressions: spurious drift, structural change, and intercept correction / Ronald Bewley -- Econometric modeling based on pattern recognition via the fuzzy C-means clustering algorithm / David E.A. …”
    Full text (WIT users only)
    Electronic eBook
  14. 214

    Introduction to electronic defense systems / Filippo Neri. by Neri, Filippo

    Published 2018
    Table of Contents: “…3.7.5 Software Radio3.7.6 Civilian Communication Networks; 3.8 Information Operations; 3.8.1 Information Cycle: The OODA Loop; 3.8.2 Information Processes and Tools; 3.8.3 Information Contents (on Subjects or Events); 3.8.4 Parameters Defining Information Value; 3.8.5 Information in War Operations; 3.8.6 Network Centric Warfare; References; Chapter 4 Electronic Intercept Systems; 4.1 Introduction; 4.2 RF Passive Systems; 4.2.1 The Equation of RF Passive Systems; 4.2.2 Radar Warning Receivers; 4.2.3 ESM Systems; 4.2.4 ELINT; 4.2.5 Digital Receiver for Modern Intercept Systems.…”
    Full text (Wentworth users only)
    Electronic eBook
  15. 215
  16. 216
  17. 217

    Introduction to electronic defense systems / Filippo Neri. by Neri, Filippo

    Published 2018
    Table of Contents: “…3.7.5 Software Radio3.7.6 Civilian Communication Networks; 3.8 Information Operations; 3.8.1 Information Cycle: The OODA Loop; 3.8.2 Information Processes and Tools; 3.8.3 Information Contents (on Subjects or Events); 3.8.4 Parameters Defining Information Value; 3.8.5 Information in War Operations; 3.8.6 Network Centric Warfare; References; Chapter 4 Electronic Intercept Systems; 4.1 Introduction; 4.2 RF Passive Systems; 4.2.1 The Equation of RF Passive Systems; 4.2.2 Radar Warning Receivers; 4.2.3 ESM Systems; 4.2.4 ELINT; 4.2.5 Digital Receiver for Modern Intercept Systems.…”
    Full text (WIT users only)
    Electronic eBook
  18. 218

    Advanced Guide to PHP on IBM i / Kevin Schroeder. by Schroeder, Kevin

    Published 2014
    Table of Contents: “…Introduction to Dependency InjectionChapter 3: Standard PHP Library; Spl_Autoload_Register() ; Countable; ArrayAccess; Iterator; ArrayObject; Advanced Usage; Intercepting Inserts; Typing Array Values; Lazy Loading; Conclusion; Chapter 4: Debugging Basics; Tunneling; Initiating a Debug Session; Flow Control; Variables; Expressions; Breakpoints; Toolbars; Manual Control; Conclusion; Chapter 5: Security; SQL Injection; Cross-Site Scripting; Cross-Site Request Forgery; Session Fixation; Session Hijacking; Validating Input; Predictable Locations and Dangerous Files; Using Encryption; Hashing.…”
    Full text (Wentworth users only)
    Electronic eBook
  19. 219

    Game changers : the 50 greatest plays in Philadelphia Eagles football history / Reuben Frank and Mark Eckel. by Frank, Reuben, 1959-

    Published 2009
    Table of Contents: “…Steve Van Buren 7, Chicago Cardinals 0; 5. "The Greatest Interception Return in NFL History"; 4. Fourth-and-26; 3. …”
    Full text (Wentworth users only)
    Electronic eBook
  20. 220

    JavaScript security : learn JavaScript security to make your web applications more secure / Y.E. Liang. by Liang, Y. E.

    Published 2014
    Table of Contents: “…; Examples of JavaScript phishing; Classic examples; Accessing user history by accessing local state; XSS and CSRF; Intercepting events; Defending against JavaScript phishing; Upgrading to latest versions of web browsers; Recognizing real web pages; Protecting your site against XSS and CSRF; Avoid using pop ups and keep your address bars; Summary; Index…”
    Full text (Wentworth users only)
    Electronic eBook