Search Results - (((((( Weapons of ((mass destruction) OR (_ destruction)). ) OR ( Weapons of fines destruction. ))) OR ( Weapons of image introduction. ))) OR ( Weapons of 1945 destruction. ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Chemical weapons destruction and explosive waste : unexploded ordnance remediation by Noyes, Robert

    Published: Noyes Publications, 1996
    Description: 1 online resource (xv, 235 pages) : illustrations, maps.
    Contents: “…Part I: Chemical Weapons Destruction -- Introduction -- Chemical Stockpile Disposal Program -- Baseline Incineration -- Alternatives to Incineration -- Nonstockpile Program -- Canadian Experience -- Part II: Explosive Waste Remediation -- Introduction -- Biological Treatment Process -- Thermal/Oxidation Processes -- Other Processes -- Explosives Contaminated Debris -- Part III: Unexploded Ordnance -- UXO Detection, Clearance, and Extraction -- Recycling and Reuse -- Destroying and Recycling Materials Resulting from Dismantling Nuclear Weapons -- Sources of Information -- Index.…”
    Elsevier - Click here for access
    eBook
  2. 2

    The Genesis of new weapons : decision making for military R & D by ScienceDirect (Online service)

    Published: Pergamon Press, 1980
    Description: 1 online resource (viii, 210 pages) : illustrations.
    Elsevier - Click here for access
    eBook
  3. 3

    Handbook of toxicology of chemical warfare agents 1st ed. by ScienceDirect (Online service)

    Published: Elsevier/Academic Press, 2009
    Description: 1 online resource (xviii, 1147 pages, 14 unnumbered pages of plates) : illustrations, portraits.
    Contents: “…Agents that can be used as weapons of mass destruction -- section 3. Target organ toxicity -- section 4. …”
    Elsevier - Click here for access
    eBook
  4. 4

    Ethics for science policy : proceedings of a Nobel symposium held at Södergarn, Sweden, 20-25 August, 1978 1st ed. by Nobelstiftelsen, ScienceDirect (Online service)

    Published: Published for the Royal Swedish Academy of Sciences by Pergamon Press, 1979
    Description: 1 online resource (xiv, 255 pages)
    Contents: “…Science, progress and destruction /…”
    Elsevier - Click here for access
    eBook
  5. 5

    Prospects for peace 1st ed. by Barnaby, Frank

    Published: Pergamon, 1980
    Description: 1 online resource (v, 88 pages) : illustrations.
    Contents: “…Prospects for Peace; The Increasing Frequency of War; Nuclear Miscalculation; Nuclear Deterrence-the Rationalization of Nuclear Weapons Deployment; Neither Disarmament nor Arms Control; Hot Line; The Public Misled; The Role of Public Opinion; The Role of the Scientists; The Role of the Trades Unions; The Role of the Churches; The Role of the Mass Media; The Role of the Smaller Powers.…”
    Elsevier - Click here for access
    eBook
  6. 6

    Maritime security an introduction by McNicholas, Michael

    Published: Elsevier/Butterworth Heinemann, 2008
    Description: 1 online resource (xxii, 447 pages) : illustrations, maps.
    Elsevier - Click here for access
    Electronic eBook
  7. 7

    Radioactive contamination in residential areas by ScienceDirect (Online service)

    Published: Elsevier Science, 2008
    Description: 1 online resource (1 volume).
    Elsevier - Click here for access
    eBook
  8. 8

    Maritime security : an introduction by McNicholas, Michael

    Published: Academic, 2008
    Description: 1 online resource (xxii, 447 pages) : illustrations, maps.
    Elsevier - Click here for access
    eBook
  9. 9

    Decision making in emergency management by Glarum, Jan

    Published: Elsevier Science & Technology, 2019
    Description: 1 online resource (302 pages)
    Contents: “…Failing infrastructure must be considered in many disaster situations -- Weather-related hazards, technological hazards, and induced events (terrorists' use of weapons of mass destruction) -- Continued urbanization across the world -- Weather-related hazards -- Floods -- Coastal flooding -- Earthquakes -- Volcanoes -- Tsunamis -- Hurricanes -- NDMS DMAT assets as a key factor in early hurricane response -- Winter storms -- Tornadoes -- Droughts and wildfires -- Heat waves -- Urban heat islands -- Technological hazards -- Lessons for industry based on the Three Mile Island (TMI) reactor disaster -- Lessons for the regulator based on the Three Mile island (TMI) reactor disaster.…”
    Elsevier - Click here for access
    eBook
  10. 10

    Nutraceutical and functional food regulations in the United States and around the world Third edition. by ScienceDirect (Online service)

    Published: Academic Press, 2019
    Description: 1 online resource.
    Contents: “…; 1.5 Transforming evangelism into evidence; 1.6 Land mines and weapons of brand destruction.…”
    Elsevier - Click here for access
    eBook
  11. 11

    Emergency medicine secrets 5th ed. by ScienceDirect (Online service)

    Published: Elsevier/Mosby, 2011
    Description: 1 online resource (xviii, 750 pages) : illustrations.
    Contents: “…EMERGENCY MEDICAL SERVICES SYSTEMS AND MASS CASUALTY INCIDENTS 101. Weapons of Mass Destruction.…”
    Elsevier - Click here for access
    eBook
  12. 12

    Electronic Warfare : Element of Strategy and Multiplier of Combat Power by Gordon, Don E. (Don Edward), 1940-

    Published: Elsevier Science, 1981
    Description: 1 online resource (319 pages)
    Contents: “…Cover image; Title page; Table of Contents; Copyright; FOREWORD; Chapter 1: Introduction; Publisher Summary; CHANGING THE DEFINITION OF ELECTRONIC WARFARE; A NEW DEFINITION OF ELECTRONIC WARFARE; BACKGROUND; Chapter 2: The Strategy; Publisher Summary; THE GERMAN STRATEGY; STRATEGIC TASKS; Chapter 3: Cryptology; Publisher Summary; AN ELECTRONIC WARFARE WEAPON; BRITISH CRYPTOLOGY; THE BATTLE OF JUTLAND; BETWEEN WARS; TWO VITAL DECISIONS; POLISH CRYPTOLOGY; ENIGMA; FRENCH CRYPTOLOGY; THE POLISH GIFT; HOW ENIGMA WORKED; GERMAN CRYPTOLOGY; UNITED STATES CRYPTOLOGY; Chapter 4: Microwave Radar.…”
    Elsevier - Click here for access
    eBook
  13. 13

    Mechatronics for safety, security and dependability in a new era 1st ed. by International Conference on Machine Automation Osaka University, ScienceDirect (Online service)

    Published: Elsevier, 2007
    Description: 1 online resource (xvi, 447 pages) : illustrations.
    Elsevier - Click here for access
    Conference Proceeding eBook
  14. 14

    Augmented reality law, privacy, and ethics : law, society, and emerging AR technologies by Wassom, Brian

    Published: Syngress, 2015
    Description: 1 online resource (xxii, 338 pages) : color illustrations.
    Contents: “…Nintendo -- Patents as Weapons of Competition: 1-800-Contacts v. Ditto Technologies -- The First AR Patent Troll: Lennon Image Technologies -- Trademarks -- Trademark Basics -- Expanding Trademark Law by Augmenting New Senses -- Keyword Advertising in the Augmented Medium -- Fair Use and Free Speech -- Copyright -- Copyright Basics -- Obtaining Copyrights -- Reproduction and Derivative Works -- Public Display and Performance -- Moral Rights -- Fair Use -- Augmented Copyright Enforcement -- Licensing -- The Right of Publicity -- The Basics of Publicity Rights -- Facial Recognition as Infringing the Right of Publicity.…”
    Elsevier - Click here for access
    eBook
  15. 15

    Radioactivity History, Science, Vital Uses and Ominous Peril 3rd edition. by L'Annunziata, Michael F.

    Published: Elsevier, 2022
    Description: 1 online resource : Approx. 300 illustrations (150 in full color)
    Elsevier - Click here for access
    eBook
  16. 16

    Social engineering penetration testing : executing social engineering pen tests, assessments and defense by Watson, Gavin, 1982-

    Published: Elsevier Science, 2014
    Description: 1 online resource.
    Contents: “…-- Document metadata -- Strings -- FOCA-http://www.informatica64.com/foca.aspx -- Metagoofil -- Why document metadata is useful to social engineers -- Photographic metadata -- Exiftool-http://www.sno.phy.queensu.ca/p̃hil/exiftool/ -- Image Picker-a Firefox add-on-https://addons.mozilla.org/en-us/firefox/addon/image-picker/ -- Using Wget to download images from a site -- GeoSetter-http://www.geosetter.de/en/ -- Reverse image search engines -- Not so metadata -- PDFGrep-http://pdfgrep.sourceforge.net -- Document obfuscation -- The Way Back Machine-http://archive.org/web/web.php -- E-mail addresses -- Phishing attacks -- Password attacks -- Insider knowledge -- E-mail address conventions -- theharvester-https://code.google.com/p/theharvester/ -- FOCA -- Metagoofil -- Whois -- Sam Spade -- Jigsaw -- Recon-ng-https://bitbucket.org/LaNMaSteR53/recon-ng-also includes a handful of Jigsaw modules -- Social media -- LinkedIn -- Recon-ng-https://bitbucket.org/LaNMaSteR53/recon-ng -- Facebook -- Twitter -- Recon-ng -- DNS records -- Dnsrecon-https://github.com/darkoperator/dnsrecon-Twitter-@Carlos_Perez -- Subdomain brute forcing -- CeWL-http://www.digininja.org/projects/cewl.php -- Whois records -- Making use of the intel -- Summary -- 9 The E-mail Attack Vector -- Introduction -- An introduction to phishing attacks -- Why phishing attacks work -- The client-side attack -- Spear phishing versus trawling -- Trawling.…”
    Elsevier - Click here for access
    eBook