Suggested Topics within your search.
Suggested Topics within your search.
- Computer networks 47
- Security measures 43
- History 35
- Application software 20
- Development 17
- Electronics in military engineering 17
- Mathematics 17
- Computer security 15
- Management 15
- Data protection 14
- Radar 14
- Hydrology 13
- Prevention 13
- Wireless communication systems 13
- Computer science 11
- Engineering 11
- Law and legislation 11
- Mathematical models 11
- Telecommunication 11
- methods 11
- Data processing 10
- Artificial intelligence 9
- Information technology 9
- Computer crimes 8
- Malocclusion 8
- Medicine 8
- Penetration testing (Computer security) 8
- Web site development 8
- Web sites 8
- Data encryption (Computer science) 7
Search alternatives:
"interceptions" » "interception" (Expand Search), "interventions" (Expand Search), "interactions" (Expand Search)
"interceptions" » "interception" (Expand Search), "interventions" (Expand Search), "interactions" (Expand Search)
-
201
Reading the enemy's mail : origins and development of U.S. Army tactical radio intelligence in World War II, European Theater of Operations.
Published 2015Table of Contents: “…TABLE OF CONTENTS; ABSTRACT; ACKNOWLEDGMENTS; LIST OF ILLUSTRATIONS; CHAPTER ONE-INTRODUCTION; World War I (1914-1918); Germany; United States; Inter-war period (1918-1938); Germany; United States; CHAPTER TWO-ORGANIZATION AND DOCTRINE; Organization and Doctrine-1940; Organization; Doctrine; Doctrine and Organization-Post 1940; Training; Doctrine and Organization-German Forces; CHAPTER THREE-WARTIME OPERATIONS; Intercept Operations; Direction Finding Operations; Traffic Analysis; Monitoring Allied Nets; Unit Case Studies; 3250th Signal Service Company (RI).…”
Full text (Wentworth users only)
Electronic eBook -
202
Mixed Models : Theory and Applications with R.
Published 2013Table of Contents: “…2.2.4 Profile log-likelihood functions -- 2.2.5 Dimension-reduction GLS estimate -- 2.2.6 Restricted maximum likelihood -- 2.2.7 Weight versus height (continued) -- 2.3 Balanced random-coefficient model -- 2.4 LME model with random intercepts -- 2.4.1 Balanced random-intercept model -- 2.4.2 How random effect affects the variance of MLE -- 2.5 Criterion for MLE existence -- 2.6 Criterion for the positive definiteness of matrix D -- 2.6.1 Example of an invalid LME model -- 2.7 Pre-estimation bounds for variance parameters -- 2.8 Maximization algorithms…”
Full text (Wentworth users only)
Electronic eBook -
203
Learning Python Web Penetration Testing : Automate Web Penetration Testing Activities Using Python.
Published 2018Table of Contents: “…; Automating basic extractions; Advanced SQLi exploiting; Summary; Chapter 7: Intercepting HTTP Requests; HTTP proxy anatomy; What is an HTTP proxy?…”
Full text (Wentworth users only)
Electronic eBook -
204
Learning zANTI2 for Android pentesting : dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 / Mir...
Published 2015Table of Contents: “…; ARP spoofing; MITM attacks through zANTI2; Logged requests; ZPacketEditor; SSL Strip; HTTP redirection; Replacing images; Capture/intercept downloads; Insert HTML; Summary; Index.…”
Full text (Wentworth users only)
Electronic eBook -
205
Sulfuric acid manufacture : analysis, control and optimization / by Matthew J. King, William G. Davenport, Michael S. Moats.
Published 2013Table of Contents: “…Maximum SO2 oxidation : heatup path-equilibrium curve intercepts -- 13. Cooling first catalyst bed exit gas -- 14. …”
Full text (Wentworth users only)
Electronic eBook -
206
Sulfuric acid manufacture : analysis, control and optimization / by Matthew J. King, William G. Davenport, Michael S. Moats.
Published 2013Table of Contents: “…Maximum SO2 oxidation : heatup path-equilibrium curve intercepts -- 13. Cooling first catalyst bed exit gas -- 14. …”
Full text (Wentworth users only)
Electronic eBook -
207
Learning Python Web Penetration Testing : Automate Web Penetration Testing Activities Using Python.
Published 2018Table of Contents: “…; Automating basic extractions; Advanced SQLi exploiting; Summary; Chapter 7: Intercepting HTTP Requests; HTTP proxy anatomy; What is an HTTP proxy?…”
Full text (Wentworth users only)
Electronic eBook -
208
Learning zANTI2 for Android pentesting : dive into the world of advanced network penetration tests to survey and attack wireless networks using your Android device and zANTI2 / Mir...
Published 2015Table of Contents: “…; ARP spoofing; MITM attacks through zANTI2; Logged requests; ZPacketEditor; SSL Strip; HTTP redirection; Replacing images; Capture/intercept downloads; Insert HTML; Summary; Index.…”
Full text (Wentworth users only)
Electronic eBook -
209
Plant physics / Karl J. Niklas and Hanns-Christof Spatz.
Published 2012Table of Contents: “…Three transport laws -- Boundary layers -- Living in water versus air -- Passive diffusion of carbon dioxide in the boundary layer in air and in water -- Light interception and photosynthesis -- Absorption of light by chloroplasts -- Formulas for the effective light absorption cross section of some geometric objects -- Modeling light interception in canopies -- Phototropism -- Mechanoperception -- Thigmomorphogenesis -- Gravitropism -- Root growth, root anchorage, and soil properties. -- Plant Water Relations. …”
Full text (Wentworth users only)
Electronic eBook -
210
Radio Frequency Integrated Circuit Design.
Published 2010Table of Contents: “…2.1 Introduction2.2 Noise; 2.2.1 Thermal Noise; 2.2.2 Available Noise Power; 2.2.3 Available Power from Antenna; 2.2.4 The Concept of Noise Figure; 2.2.5 The Noise Figure of an Amplifier Circuit; 2.2.6 Phase Noise; 2.3 Linearity and Distortion in RF Circuits; 2.3.1 Power Series Expansion; 2.3.2 Third-Order Intercept Point; 2.3.3 Second-Order Intercept Point; 2.3.4 The 1-dB Compression Point; 2.3.5 Relationships Between 1-dB Compression and IP3 Points; 2.3.6 Broadband Measures of Linearity; 2.4 Modulated Signals; 2.4.1 Phase Modulation; 2.4.2 Frequency Modulation.…”
Full text (Wentworth users only)
Electronic eBook -
211
Perspectives on Drug Use in the United States.
Published 2014Table of Contents: “…Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; Drug Laws and Drug Law Enforcement: A Review and Evaluation Based on 111 Years of Experience; Introduction; Opium Smoking; The Harrison Narcotic Act (1914); ""Tightening Up" the Harrison Act; The Economics of the Black Market; Closing the Borders to Smuggling; Cocaine and the Amphetamines; The Marijuana Tax Act (1937); Operation Intercept; Curbing Drug Production Abroad; Curbing U.S. …”
Full text (Wentworth users only)
Electronic eBook -
212
Celestial navigation for yachtsmen / Mary Blewitt.
Published 2008Table of Contents: “…Cover; Copyright; Contents; The Theory; Heavenly Bodies; The Geographical Position; Declination; Hour Angle; The Zenith; The Horizon; Altitude; Zenith Distance; The Elevated Pole; Azimuth and Azimuth Angle; Great Circles; Universal Time; The Position Line; The Meridian Passage; Spherical Triangles; The Intercept; Sextant Altitude and True Altitude; Dip; Refraction; Semi-Diameter; Parallax; The Practice; Almanacs and Tables; A Sun Sight in Winter; Using the Sextant; Recording the Sights; Correcting the Data: Watch Time to UT; ; Sextant Altitude to True Altitude.…”
Full text (Wentworth users only)
Electronic eBook -
213
Computer-aided econometrics edited by David E.A. Giles.
Published 2003Table of Contents: “…Kaashoek and Herman K. van Dijk -- Real-time forecasting with vector autoregressions: spurious drift, structural change, and intercept correction / Ronald Bewley -- Econometric modeling based on pattern recognition via the fuzzy C-means clustering algorithm / David E.A. …”
Full text (WIT users only)
Electronic eBook -
214
Introduction to electronic defense systems / Filippo Neri.
Published 2018Table of Contents: “…3.7.5 Software Radio3.7.6 Civilian Communication Networks; 3.8 Information Operations; 3.8.1 Information Cycle: The OODA Loop; 3.8.2 Information Processes and Tools; 3.8.3 Information Contents (on Subjects or Events); 3.8.4 Parameters Defining Information Value; 3.8.5 Information in War Operations; 3.8.6 Network Centric Warfare; References; Chapter 4 Electronic Intercept Systems; 4.1 Introduction; 4.2 RF Passive Systems; 4.2.1 The Equation of RF Passive Systems; 4.2.2 Radar Warning Receivers; 4.2.3 ESM Systems; 4.2.4 ELINT; 4.2.5 Digital Receiver for Modern Intercept Systems.…”
Full text (Wentworth users only)
Electronic eBook -
215
LTE for public safety / Rainer Liebhart, Devaki Chandramouli, Curt Wong, Jurgen Merkel, Nokia, Networks Division.
Published 2015Table of Contents: Full text (Wentworth users only)
Electronic eBook -
216
LTE for public safety / Rainer Liebhart, Devaki Chandramouli, Curt Wong, Jurgen Merkel, Nokia, Networks Division.
Published 2015Table of Contents: Full text (Wentworth users only)
Electronic eBook -
217
Introduction to electronic defense systems / Filippo Neri.
Published 2018Table of Contents: “…3.7.5 Software Radio3.7.6 Civilian Communication Networks; 3.8 Information Operations; 3.8.1 Information Cycle: The OODA Loop; 3.8.2 Information Processes and Tools; 3.8.3 Information Contents (on Subjects or Events); 3.8.4 Parameters Defining Information Value; 3.8.5 Information in War Operations; 3.8.6 Network Centric Warfare; References; Chapter 4 Electronic Intercept Systems; 4.1 Introduction; 4.2 RF Passive Systems; 4.2.1 The Equation of RF Passive Systems; 4.2.2 Radar Warning Receivers; 4.2.3 ESM Systems; 4.2.4 ELINT; 4.2.5 Digital Receiver for Modern Intercept Systems.…”
Full text (WIT users only)
Electronic eBook -
218
Advanced Guide to PHP on IBM i / Kevin Schroeder.
Published 2014Table of Contents: “…Introduction to Dependency InjectionChapter 3: Standard PHP Library; Spl_Autoload_Register() ; Countable; ArrayAccess; Iterator; ArrayObject; Advanced Usage; Intercepting Inserts; Typing Array Values; Lazy Loading; Conclusion; Chapter 4: Debugging Basics; Tunneling; Initiating a Debug Session; Flow Control; Variables; Expressions; Breakpoints; Toolbars; Manual Control; Conclusion; Chapter 5: Security; SQL Injection; Cross-Site Scripting; Cross-Site Request Forgery; Session Fixation; Session Hijacking; Validating Input; Predictable Locations and Dangerous Files; Using Encryption; Hashing.…”
Full text (Wentworth users only)
Electronic eBook -
219
Game changers : the 50 greatest plays in Philadelphia Eagles football history / Reuben Frank and Mark Eckel.
Published 2009Table of Contents: “…Steve Van Buren 7, Chicago Cardinals 0; 5. "The Greatest Interception Return in NFL History"; 4. Fourth-and-26; 3. …”
Full text (Wentworth users only)
Electronic eBook -
220
JavaScript security : learn JavaScript security to make your web applications more secure / Y.E. Liang.
Published 2014Table of Contents: “…; Examples of JavaScript phishing; Classic examples; Accessing user history by accessing local state; XSS and CSRF; Intercepting events; Defending against JavaScript phishing; Upgrading to latest versions of web browsers; Recognizing real web pages; Protecting your site against XSS and CSRF; Avoid using pop ups and keep your address bars; Summary; Index…”
Full text (Wentworth users only)
Electronic eBook