Marine Artillery Survey Operations


Book Description

Marine Corps Warfighting Publication (MCWP) 3-16.7, Marine Artillery Survey Operations, sets forth the doctrinal foundation and technical information that Marines need to provide accurate and timely survey support.




Arms Industry Transformation and Integration


Book Description

SIPRI is an independent international institute dedicated to research into conflict, armaments, arms control and disarmament. Established in 1966, SIPRI provides data, analysis and recommendations, based on open sources, to policymakers, researchers, media and the interested public. Book jacket.




Advances in Decision Sciences, Image Processing, Security and Computer Vision


Book Description

This book constitutes the proceedings of the First International Conference on Emerging Trends in Engineering (ICETE), held at University College of Engineering and organised by the Alumni Association, University College of Engineering, Osmania University, in Hyderabad, India on 22–23 March 2019. The proceedings of the ICETE are published in three volumes, covering seven areas: Biomedical, Civil, Computer Science, Electrical & Electronics, Electronics & Communication, Mechanical, and Mining Engineering. The 215 peer-reviewed papers from around the globe present the latest state-of-the-art research, and are useful to postgraduate students, researchers, academics and industry engineers working in the respective fields. Volume 1 presents papers on the theme “Advances in Decision Sciences, Image Processing, Security and Computer Vision – International Conference on Emerging Trends in Engineering (ICETE)”. It includes state-of-the-art technical contributions in the area of biomedical and computer science engineering, discussing sustainable developments in the field, such as instrumentation and innovation, signal and image processing, Internet of Things, cryptography and network security, data mining and machine learning.




Handbook of Stable Isotope Analytical Techniques


Book Description

(Parent with price) Volume I contains subjective reviews, specialized and novel technique descriptions by guest authors. Part 1 includes contributions on purely analytical techniques and Part 2 includes matters such as development of mass spectrometers, stability of ion sources, standards and calibration, correction procedures and experimental methods to obtain isotopic fractionation factors.Volume II will be available in 2005.




Future Access Enablers for Ubiquitous and Intelligent Infrastructures


Book Description

This book constitutes the refereed post-conference proceedings of the 5th International Conference on Future Access Enablers for Ubiquitous and Intelligent Infrastructures, FABULOUS 2021, held in May 2021. Due to COVID-19 pandemic the conference was held virtually. This year’s conference topic covers security of innovative services and infrastructure in traffic, transport and logistic ecosystems. The 30 revised full papers were carefully reviewed and selected from 60 submissions. The papers are organized in thematic sessions on: Internet of things and smart city; smart environment applications; information and communications technology; smart health applications; sustainable communications and computing infrastructures.




Network Analysis using Wireshark Cookbook


Book Description

Network analysis using Wireshark Cookbook contains more than 100 practical recipes for analyzing your network and troubleshooting problems in the network. This book provides you with simple and practical recipes on how to solve networking problems with a step-by-step approach. This book is aimed at research and development professionals, engineering and technical support, and IT and communications managers who are using Wireshark for network analysis and troubleshooting. This book requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.




Distributed Denial of Service Attacks


Book Description

Distributed Denial of Service (DDoS) attacks have become more destructive, wide-spread and harder to control over time. This book allows students to understand how these attacks are constructed, the security flaws they leverage, why they are effective, how they can be detected, and how they can be mitigated. Students use software defined networking (SDN) technology to created and execute controlled DDoS experiments. They learn how to deploy networks, analyze network performance, and create resilient systems. This book is used for graduate level computer engineering instruction at Clemson University. It augments the traditional graduate computing curricula by integrating: Internet deployment, network security, ethics, contemporary social issues, and engineering principles into a laboratory based course of instruction. Unique features of this book include: A history of DDoS attacks that includes attacker motivations Discussion of cyber-war, censorship, and Internet black-outs SDN based DDoS laboratory assignments Up-to-date review of current DDoS attack techniques and tools Review of the current laws that globally relate to DDoS Abuse of DNS, NTP, BGP and other parts of the global Internet infrastructure to attack networks Mathematics of Internet traffic measurement Game theory for DDoS resilience Construction of content distribution systems that absorb DDoS attacks This book assumes familiarity with computing, Internet design, appropriate background in mathematics, and some programming skills. It provides analysis and reference material for networking engineers and researchers. By increasing student knowledge in security, and networking; it adds breadth and depth to advanced computing curricula.




Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics


Book Description

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23–25, 2015.




We Are Fighting the World


Book Description

Since the late 1940s, a violent African criminal society known as the Marashea has operated in and around South Africa’s gold mining areas. With thousands of members involved in drug smuggling, extortion, and kidnapping, the Marashea was more influential in the day-to-day lives of many black South Africans under apartheid than were agents of the state. These gangs remain active in South Africa. In We Are Fighting the World: A History of the Marashea Gangs in South Africa, 1947–1999, Gary Kynoch points to the combination of coercive force and administrative weakness that characterized the apartheid state. As long as crime and violence were contained within black townships and did not threaten adjacent white areas, township residents were largely left to fend for themselves. The Marashea’s ability to prosper during the apartheid era and its involvement in political conflict led directly to the violent crime epidemic that today plagues South Africa. Highly readable and solidly researched, We Are Fighting the World is critical to an understanding of South African society, past and present. This pioneering study challenges previous social history research on resistance, ethnicity, urban spaces, and gender in South Africa. Kynoch’s interviews with many current and former gang members give We Are Fighting the World an energy and a realism that are unparalleled in any other published work on gang violence in southern Africa.




Research in Intelligent and Computing in Engineering


Book Description

This book comprises select peer-reviewed proceedings of the international conference on Research in Intelligent and Computing in Engineering (RICE 2020) held at Thu Dau Mot University, Vietnam. The volume primarily focuses on latest research and advances in various computing models such as centralized, distributed, cluster, grid, and cloud computing. Practical examples and real-life applications of wireless sensor networks, mobile ad hoc networks, and internet of things, data mining and machine learning are also covered in the book. The contents aim to enable researchers and professionals to tackle the rapidly growing needs of network applications and the various complexities associated with them.