A Versatile Digital Video Engine for Safeguards and Security Applications
Author :
Publisher :
Page : pages
File Size : 47,86 MB
Release : 1996
Category :
ISBN :
Author :
Publisher :
Page : pages
File Size : 47,86 MB
Release : 1996
Category :
ISBN :
Author : International Atomic Energy Agency
Publisher :
Page : 146 pages
File Size : 41,18 MB
Release : 2011
Category : Environmental sampling
ISBN : 9789201189103
The 1990s saw significant developments in the global non-proliferation landscape, resulting in a new period of safeguards development. The current publication, which is the second revision and update of IAEA/NVS/1, is intended to give a full and balanced description of the safeguards techniques and equipment used for nuclear material accountancy, containment and surveillance measures, environmental sampling, and data security. New features include a section on new and novel technologies. As new verification measures continue to be developed, the material in this book will be reviewed periodically and updated versions issued.
Author :
Publisher :
Page : 1278 pages
File Size : 10,36 MB
Release : 1984
Category : Aeronautics
ISBN :
Author : Nripendra P. Rana
Publisher : Springer Nature
Page : 337 pages
File Size : 46,17 MB
Release : 2019-11-11
Category : Business & Economics
ISBN : 3030243745
This book examines issues and implications of digital and social media marketing for emerging markets. These markets necessitate substantial adaptations of developed theories and approaches employed in the Western world. The book investigates problems specific to emerging markets, while identifying new theoretical constructs and practical applications of digital marketing. It addresses topics such as electronic word of mouth (eWOM), demographic differences in digital marketing, mobile marketing, search engine advertising, among others. A radical increase in both temporal and geographical reach is empowering consumers to exert influence on brands, products, and services. Information and Communication Technologies (ICTs) and digital media are having a significant impact on the way people communicate and fulfil their socio-economic, emotional and material needs. These technologies are also being harnessed by businesses for various purposes including distribution and selling of goods, retailing of consumer services, customer relationship management, and influencing consumer behaviour by employing digital marketing practices. This book considers this, as it examines the practice and research related to digital and social media marketing.
Author : Doug Reilly
Publisher :
Page : 700 pages
File Size : 45,20 MB
Release : 1991
Category : Non-destructive testing
ISBN : 9780160327247
Author : National Research Council
Publisher : National Academies Press
Page : 348 pages
File Size : 28,34 MB
Release : 2009-07-29
Category : Law
ISBN : 0309142393
Scores of talented and dedicated people serve the forensic science community, performing vitally important work. However, they are often constrained by lack of adequate resources, sound policies, and national support. It is clear that change and advancements, both systematic and scientific, are needed in a number of forensic science disciplines to ensure the reliability of work, establish enforceable standards, and promote best practices with consistent application. Strengthening Forensic Science in the United States: A Path Forward provides a detailed plan for addressing these needs and suggests the creation of a new government entity, the National Institute of Forensic Science, to establish and enforce standards within the forensic science community. The benefits of improving and regulating the forensic science disciplines are clear: assisting law enforcement officials, enhancing homeland security, and reducing the risk of wrongful conviction and exoneration. Strengthening Forensic Science in the United States gives a full account of what is needed to advance the forensic science disciplines, including upgrading of systems and organizational structures, better training, widespread adoption of uniform and enforceable best practices, and mandatory certification and accreditation programs. While this book provides an essential call-to-action for congress and policy makers, it also serves as a vital tool for law enforcement agencies, criminal prosecutors and attorneys, and forensic science educators.
Author :
Publisher :
Page : 690 pages
File Size : 43,81 MB
Release : 1969
Category : Measurement
ISBN :
Measurement, control, automation.
Author : Kenneth C. Laudon
Publisher : Pearson Educación
Page : 618 pages
File Size : 32,50 MB
Release : 2004
Category : Business & Economics
ISBN : 9789702605287
Management Information Systems provides comprehensive and integrative coverage of essential new technologies, information system applications, and their impact on business models and managerial decision-making in an exciting and interactive manner. The twelfth edition focuses on the major changes that have been made in information technology over the past two years, and includes new opening, closing, and Interactive Session cases.
Author : United States. Congress. House. Select Committee on U.S. National Security and Military/Commercial Concerns with the People's Republic of China
Publisher :
Page : 8 pages
File Size : 13,56 MB
Release : 1999
Category : China
ISBN :
Transmittal letter.
Author : Kewei Sha
Publisher : River Publishers
Page : 446 pages
File Size : 15,51 MB
Release : 2016-11-30
Category : Computers
ISBN : 8793379897
Future communication networks aim to build an intelligent and efficient living environment by connecting a variety of heterogeneous networks to fulfill complicated tasks. These communication networks bring significant challenges in building secure and reliable communication networks to address the numerous threat and privacy concerns. New research technologies are essential to preserve privacy, prevent attacks, and achieve the requisite reliability. Security, Privacy and Reliability in Computer Communications and Networks studies and presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed in the book include: Vulnerabilities and Intrusion DetectionCryptographic Algorithms and EvaluationPrivacy Reliable Routing Protocols This book is ideal for personnel in computer communication and networking industries as well as academic staff and collegial, master, Ph.D. students in computer science, computer engineering, cyber security, information insurance and telecommunication systems.