Search alternatives:
chemical physics » mathematical physics

1
by Das, Sajal K.
Published 2012
Morgan Kaufmann
... attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose...

2
by Wang, Jianqing, Wang, Qiong
Published 2013
IEEE
Subjects: ...Télématique médicale...

3
Published 2017
Syngress is an imprint of Elsevier
..., cyber physical systems, tradeoffs between safety, security, and performance, as well as the current...

4
by Taylor, Allen G.
Published 2015
Apress
Table of Contents: ...; Runtastic and Runtastic Pro; Strava; Medical ID; Setting New Goals; Summary; Chapter 7: Using the Apple...

5
by Chang, Kuang-Hua
Published 2014
Academic Press
Table of Contents: ... PHYSICAL PROTOTYPING; 1.5 EXAMPLE: SIMPLE AIRPLANE ENGINE; 1.6 EXAMPLE: HIGH-MOBILITY MULTIPURPOSE WHEELED...

6
by Amen, Daniel G.
Published 2017
Recorded Books
Subjects: ...Physical fitness / Health aspects / fast / (OCoLC)fst01062580...

7
by Ferraro, Eugene
Published 2012
CRC Press
Table of Contents: ... of investigation -- Physical surveillance -- Physical surveillance defined -- Stationary and moving surveillance...

8
by Elahi, Ata
Published 2010
Prentice Hall
Table of Contents: ... physical layer -- IEEE 802.15.4 Media Access Control (MAC) layer -- Network layer -- ZigBee application...

9
by Fitzwater, Terry L.
Published 1999
HRD Press
Table of Contents: ...; Immigration and reform control act -- FMLA 45; Family medical leave act of 1993 -- Sexual harassment...

10
by Bidgoli, Hossein
Published 2006
John Wiley
Table of Contents: ...Preface -- Guide to The Handbook of Information Security -- Internal Security Threats -- Physical...

11
Published 2020
CRC PRESS
... in communications, medical imaging, sensing, and security. However, for non-specialists, individual metasurfaces...

12
by Young, Carl
Published 2014
Butterworth-Heinemann
... terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive...

13
by Young, Carl S.
Published 2010
Syngress/Elsevier
... to information protection, electromagnetic pulse, biological, chemical and radiological weapons, theft...

14
Published 2021
Academic Press, an imprint of Elsevier
Table of Contents: ... of the first user -- 4.2.2. Outage probability at D2 -- 5. Improving security at physical layer -- 6...

15
by Biringer, Betty E.
Published 2013
Taylor & Francis
..., whether physical or virtual, so vital to the United States that their incapacitation or destruction would...

16
by Contos, Brian T.
Published 2006
Syngress
Table of Contents: ... Five: Correlating Physical and Logical Security EventsA U.S. Government Organization -- Chapter Six...

17
Published 2023
John Wiley & Sons, Inc.
Table of Contents: ...Increasing Black Wealth to Improve Black Health -- Decolonization of the Medical Industry...

18
by Bosworth, Seymour
Published 2009
John Wiley & Sons
Table of Contents: ...-based vulnerabilities / Anup K. Ghosh ... [and three others] -- Physical threats to the information...