Michael Gough - Böcker
Visar alla böcker från författaren Michael Gough. Handla med fri frakt och snabb leverans.
9 produkter
9 produkter
552 kr
Skickas inom 10-15 vardagar
492 kr
Skickas inom 5-8 vardagar
Three years after American raceplanes failed dismally in the most important air race of 1920, a French magazine lamented that American "pilots have broken the records which we, here in France, considered as our own for so long." The Pulitzer Trophy Air Races (1920 through 1925), endowed by the sons of publisher Joseph Pulitzer in his memory, brought about this remarkable turnaround. Pulitzer winning speeds increased from 157 to 249 mph, and Pulitzer racers, mounted on floats, twice won the most prestigious international air race--the Schneider Trophy Race for seaplanes. Airplanes, engines, propellers, and other equipment developed for the Pulitzers were sold domestically and internationally. More than a million spectators saw the Pulitzers; millions more read about them and watched them in newsreels.This, the first book about the Pulitzers, tells the story of businessmen, generals and admirals who saw racing as a way to drive aviation progress, designers and manufacturers who produced record-breaking racers, and dashing pilots who gave the races their public face. It emphasizes the roles played by the communities that hosted the races--Garden City (Long Island), Omaha, Detroit and Mt. Clemens, Michigan, St. Louis, and Dayton. The book concludes with an analysis of the Pulitzers' importance and why they have languished in obscurity for so long.
698 kr
Skickas inom 10-15 vardagar
Developed for use as a reference work in graduate and undergraduate courses as well as for researchers, policymakers, and interested laypersons, the book is a unique collection of authoritative yet accessible journal articles about risk. Drawn from a variety of disciplines including the physical and social sciences, engineering, and law, the articles deal with a wide range of public policy, regulatory, management, energy, and environmental issues. The selections are accompanied by introductory notes, questions for thought and discussion, and suggestions for further reading.
1 797 kr
Skickas inom 10-15 vardagar
Developed for use as a reference work in graduate and undergraduate courses as well as for researchers, policymakers, and interested laypersons, the book is a unique collection of authoritative yet accessible journal articles about risk. Drawn from a variety of disciplines including the physical and social sciences, engineering, and law, the articles deal with a wide range of public policy, regulatory, management, energy, and environmental issues. The selections are accompanied by introductory notes, questions for thought and discussion, and suggestions for further reading.
1 010 kr
Skickas inom 10-15 vardagar
Originally published in 1989, this report deals with issues surrounding ash residues produced by municipal waste combustors. Spurred by huge disagreements over the environmental risks that these ash residues posed; Managing Ash from Municipal Waste Incinerators attempts to shed light on the debates around the issue and move forward towards an appropriate solution. This title will be of interest to students of Environmental Studies.
332 kr
Skickas inom 10-15 vardagar
Originally published in 1989, this report deals with issues surrounding ash residues produced by municipal waste combustors. Spurred by huge disagreements over the environmental risks that these ash residues posed; Managing Ash from Municipal Waste Incinerators attempts to shed light on the debates around the issue and move forward towards an appropriate solution. This title will be of interest to students of Environmental Studies.
500 kr
Skickas inom 5-8 vardagar
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin making voice over IP calls immediately. Part II deals with the more advanced features of Skype. Here the reader learns how to use Skype on new "Skype Ready� cell phones, use Skype for more advanced, business-oriented tasks such as scheduling and file transfers, as well as using SkypeOut. Part III discusses how to integrate Skype with third party networking, communication, and security devices such as routers, firewalls, and mail servers, as well as using the brand new Skype for Business. Part IV covers the Skype Application Programming Interface, Plug-ins, Add-ons, and third party tools. Here the reader learns to develop and customize their own applications using the new, powerful, Skype API.* Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members* Skype's Application Programming Interface (API) allows users to develop their own applications and customize Skype with the information found in this book* Makrus Daehne is one of the most recognized and respected authorities on Skype and he is the forum moderator on the Skype Web site
697 kr
Skickas inom 5-8 vardagar
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video conferencing has been an attractive solution for businesses interested in cutting travel costs while maintaining the benefits of face-to-face contact. Unfortunately, most solutions never lived up to the promise, due primarily to lack of internet bandwidth and poorly developed protocols. That's no all changed. The capacity has been created, the hardware works, and businesses are more eager than ever to cut down on travel costs.* Budget conscious methods for deploying Video over IP in small to medium enterprises * Coverage of Cisco, Microsoft, Skype, AOL, Google, VidiTel and many other products* How to identify and resolve nagging quality of service issues such as transmission delays and out of synch video-to-voice feeds
677 kr
Skickas inom 5-8 vardagar
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure. * VoIP Isn't Just Another Data ProtocolIP telephony uses the Internet architecture, similar to any other data application. However, from a security administrator's point of view, VoIP is different. Understand why. * What Functionality Is Gained, Degraded, or Enhanced on a VoIP Network?Find out the issues associated with quality of service, emergency 911 service, and the major benefits of VoIP.* The Security Considerations of Voice MessagingLearn about the types of security attacks you need to protect against within your voice messaging system.* Understand the VoIP Communication ArchitecturesUnderstand what PSTN is and what it does as well as the H.323 protocol specification, and SIP Functions and features.* The Support Protocols of VoIP EnvironmentsLearn the services, features, and security implications of DNS, TFTP, HTTP, SNMP, DHCP, RSVP, SDP, and SKINNY.* Securing the Whole VoIP InfrastructureLearn about Denial-of-Service attacks, VoIP service disruption, call hijacking and interception, H.323-specific attacks, and SIP-specific attacks.* Authorized Access Begins with AuthenticationLearn the methods of verifying both the user identity and the device identity in order to secure a VoIP network.* Understand Skype SecuritySkype does not log a history like other VoIP solutions; understand the implications of conducting business over a Skype connection.* Get the Basics of a VoIP Security PolicyUse a sample VoIP Security Policy to understand the components of a complete policy. Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently Short on theory, history, and technical data that ultimately is not helpful in performing their jobs Avoid the time drains associated with securing VoIP