Search Results - "safari"
Suggested Topics within your search.
Suggested Topics within your search.
- Adaptive antennas 1
- Automobile industry and trade 1
- Computer networks 1
- Computer security 1
- Computers 1
- Data transmission systems 1
- Drone aircraft 1
- Equipment and supplies 1
- Information technology 1
- Internet programming 1
- JavaScript (Computer program language) 1
- Local area networks (computer networks) 1
- Microwave antennas 1
- Military robots 1
- Military weapons (International law) 1
- Moral and ethical aspects 1
- Peer-to-peer architecture (computer networks) 1
- Radio 1
- Security measures 1
- Security, International 1
- Standards 1
- Transmitters and transmission 1
- Travel 1
- Vacations 1
- War 1
- War and society 1
- Web sites 1
- Wireless communication systems 1
- access control 1
- design 1
-
1
The Pools of Silence
Published 2008Subjects: “…Safaris -- Congo (Democratic Republic) -- Fiction…”
Get full text
Rights
Electronic eBook -
2
Unmanned drone warfare and global security
Published 2014Table of Contents: “…From ballons to big safari: UAV development -- The drone takes off -- The UAV and military doctrine -- The consequences of killing without consequences -- Targets: the view from below -- Unlegal: justifying a drone war -- Killer robots -- From man o'war to nano war: revolutions in military affairs…”
Book -
3
Peer-to-peer building secure, scalable, and manageable networks
Published 2002Table of Contents: “…The P2P city tour: existing solutions ready now -- 3. A safari into the software developer's world -- 4. Of names and addresses -- 5. …”
Book -
4
-
5
-
6
-
7
-
8
-
9
The basics of digital privacy simple tools to protect your personal your information and your identity online
Published 2014Table of Contents: “…Turning cookies off in Internet ExplorerTurning cookies off in Firefox; Turning cookies off in Chrome; Turning off cookies in Safari; Summary -- Chapter 2: Usernames and Passwords for Websites; Picking a username; Picking a password; How passwords are figured out; Unique passwords; Creating unique passwords; Passphrases; Two-factor authentication; Using fob-based systems; Using software-based two-factor authentication systems; Using a text-messaging-based system; The more important the longer they should be; Summary -- Chapter 3: Your Home Network; Securing your home network; Securing your router. …”
Book


