Search Results - (((((( Weapons of ((maps destruction) OR (its destruction)). ) OR ( Weapons of ((((fines destruction) OR (finall destruction))) OR (fungal destruction)). ))) OR ( Weapons of image introduction. ))) OR ( Weapons of co destruction. ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Chemical weapons destruction and explosive waste : unexploded ordnance remediation by Noyes, Robert

    Published: Noyes Publications, 1996
    Description: 1 online resource (xv, 235 pages) : illustrations, maps.
    Elsevier - Click here for access
    eBook
  2. 2

    Electronic Warfare : Element of Strategy and Multiplier of Combat Power by Gordon, Don E. (Don Edward), 1940-

    Published: Elsevier Science, 1981
    Description: 1 online resource (319 pages)
    Contents: “…Cover image; Title page; Table of Contents; Copyright; FOREWORD; Chapter 1: Introduction; Publisher Summary; CHANGING THE DEFINITION OF ELECTRONIC WARFARE; A NEW DEFINITION OF ELECTRONIC WARFARE; BACKGROUND; Chapter 2: The Strategy; Publisher Summary; THE GERMAN STRATEGY; STRATEGIC TASKS; Chapter 3: Cryptology; Publisher Summary; AN ELECTRONIC WARFARE WEAPON; BRITISH CRYPTOLOGY; THE BATTLE OF JUTLAND; BETWEEN WARS; TWO VITAL DECISIONS; POLISH CRYPTOLOGY; ENIGMA; FRENCH CRYPTOLOGY; THE POLISH GIFT; HOW ENIGMA WORKED; GERMAN CRYPTOLOGY; UNITED STATES CRYPTOLOGY; Chapter 4: Microwave Radar.…”
    Elsevier - Click here for access
    eBook
  3. 3

    Maritime security an introduction by McNicholas, Michael

    Published: Elsevier/Butterworth Heinemann, 2008
    Description: 1 online resource (xxii, 447 pages) : illustrations, maps.
    Elsevier - Click here for access
    Electronic eBook
  4. 4

    Maritime security : an introduction by McNicholas, Michael

    Published: Academic, 2008
    Description: 1 online resource (xxii, 447 pages) : illustrations, maps.
    Elsevier - Click here for access
    eBook
  5. 5

    Decision making in emergency management by Glarum, Jan

    Published: Elsevier Science & Technology, 2019
    Description: 1 online resource (302 pages)
    Contents: “…Failing infrastructure must be considered in many disaster situations -- Weather-related hazards, technological hazards, and induced events (terrorists' use of weapons of mass destruction) -- Continued urbanization across the world -- Weather-related hazards -- Floods -- Coastal flooding -- Earthquakes -- Volcanoes -- Tsunamis -- Hurricanes -- NDMS DMAT assets as a key factor in early hurricane response -- Winter storms -- Tornadoes -- Droughts and wildfires -- Heat waves -- Urban heat islands -- Technological hazards -- Lessons for industry based on the Three Mile Island (TMI) reactor disaster -- Lessons for the regulator based on the Three Mile island (TMI) reactor disaster.…”
    Elsevier - Click here for access
    eBook
  6. 6

    Augmented reality law, privacy, and ethics : law, society, and emerging AR technologies by Wassom, Brian

    Published: Syngress, 2015
    Description: 1 online resource (xxii, 338 pages) : color illustrations.
    Contents: “…Nintendo -- Patents as Weapons of Competition: 1-800-Contacts v. Ditto Technologies -- The First AR Patent Troll: Lennon Image Technologies -- Trademarks -- Trademark Basics -- Expanding Trademark Law by Augmenting New Senses -- Keyword Advertising in the Augmented Medium -- Fair Use and Free Speech -- Copyright -- Copyright Basics -- Obtaining Copyrights -- Reproduction and Derivative Works -- Public Display and Performance -- Moral Rights -- Fair Use -- Augmented Copyright Enforcement -- Licensing -- The Right of Publicity -- The Basics of Publicity Rights -- Facial Recognition as Infringing the Right of Publicity.…”
    Elsevier - Click here for access
    eBook
  7. 7

    Radioactivity History, Science, Vital Uses and Ominous Peril 3rd edition. by L'Annunziata, Michael F.

    Published: Elsevier, 2022
    Description: 1 online resource : Approx. 300 illustrations (150 in full color)
    Elsevier - Click here for access
    eBook
  8. 8

    Social engineering penetration testing : executing social engineering pen tests, assessments and defense by Watson, Gavin, 1982-

    Published: Elsevier Science, 2014
    Description: 1 online resource.
    Contents: “…-- Document metadata -- Strings -- FOCA-http://www.informatica64.com/foca.aspx -- Metagoofil -- Why document metadata is useful to social engineers -- Photographic metadata -- Exiftool-http://www.sno.phy.queensu.ca/p̃hil/exiftool/ -- Image Picker-a Firefox add-on-https://addons.mozilla.org/en-us/firefox/addon/image-picker/ -- Using Wget to download images from a site -- GeoSetter-http://www.geosetter.de/en/ -- Reverse image search engines -- Not so metadata -- PDFGrep-http://pdfgrep.sourceforge.net -- Document obfuscation -- The Way Back Machine-http://archive.org/web/web.php -- E-mail addresses -- Phishing attacks -- Password attacks -- Insider knowledge -- E-mail address conventions -- theharvester-https://code.google.com/p/theharvester/ -- FOCA -- Metagoofil -- Whois -- Sam Spade -- Jigsaw -- Recon-ng-https://bitbucket.org/LaNMaSteR53/recon-ng-also includes a handful of Jigsaw modules -- Social media -- LinkedIn -- Recon-ng-https://bitbucket.org/LaNMaSteR53/recon-ng -- Facebook -- Twitter -- Recon-ng -- DNS records -- Dnsrecon-https://github.com/darkoperator/dnsrecon-Twitter-@Carlos_Perez -- Subdomain brute forcing -- CeWL-http://www.digininja.org/projects/cewl.php -- Whois records -- Making use of the intel -- Summary -- 9 The E-mail Attack Vector -- Introduction -- An introduction to phishing attacks -- Why phishing attacks work -- The client-side attack -- Spear phishing versus trawling -- Trawling.…”
    Elsevier - Click here for access
    eBook
  9. 9

    Emergency medicine secrets 5th ed. by ScienceDirect (Online service)

    Published: Elsevier/Mosby, 2011
    Description: 1 online resource (xviii, 750 pages) : illustrations.
    Elsevier - Click here for access
    eBook