| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910483614003321 |
|
|
Autore |
Sobot Robert |
|
|
Titolo |
Wireless communication electronics : introduction to RF circuits and design techniques / / Robert Sobot |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2021] |
|
©2021 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[2nd ed. 2021.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XX, 522 p. 364 illus., 287 illus. in color.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Wireless communication systems |
Radio frequency integrated circuits |
Radio frequency integrated circuits - Design and construction |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Part I.Basic concepts and definitions -- Chapter 1. Introduction -- Chapter 2.Basic behavioral and device models -- Chapter 3. Multistage Interface -- Chapter 4. Basic Semiconductor Devices -- Chapter 5. Transistor Biasing -- Chapter 6. Review of Basic Amplifiers -- Chapter 7. Introduction to frequency analysis of amplifiers -- Chapter 8. Electrical Noise -- Part II. Radio receiver circuit -- Chapter 9. Radio receiver architecture -- Chapter 10. Electrical Resonance -- Chapter 11. Matching Networks -- Chapter 12. RF and IF Amplifiers -- Chapter 13. Sinusoidal Oscillators -- Chapter 14. Frequency Shifting -- Chapter 15. Modulation -- Chapter 16. AM and FM Signal Demodulation -- Chapter 17. RF Receivers. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book is intended for senior undergraduate and graduate students as well as practicing engineers who are involved in design and analysis of radio frequency (RF) circuits. Detailed tutorials are included on all major topics required to understand fundamental principles behind both the main sub-circuits required to design an RF transceiver and the whole communication system. Starting with review of fundamental principles in electromagnetic (EM) transmission and signal propagation, through detailed practical analysis of RF amplifier, mixer, modulator, demodulator, and oscillator circuit topologies, all the way to the basic |
|
|
|
|
|
|
|
|
|
|
|
|
|
system communication theory behind the RF transceiver operation, this book systematically covers all relevant aspects in a way that is suitable for a single semester university level course. Offers readers a complete, self-sufficient tutorial style textbook; Includes all relevant topics required to study and design an RF receiver in a consistent, coherent way with appropriate depth for a one-semester course; The labs and the book chapters are synchronized throughout a 13-week semester so that the students first study each sub-circuit and the related theory in class, practice problems, work out design details and then build and test the sub-circuit in the lab, before moving onto the next chapter; Includes detailed derivations of all key equations related to new concepts. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910166652603321 |
|
|
Autore |
Robins Nick |
|
|
Titolo |
The corporation that changed the world : how the East India Company shaped the modern multinational / / Nick Robins |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[2nd ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (262 p. ) : ill., maps |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
International business enterprises - Great Britain - History |
International business enterprises - Moral and ethical aspects - Great Britain - History |
International business enterprises - Government policy - Great Britain - History |
Industry |
International business enterprises - History - Moral and ethical aspects - Great Britain |
International business enterprises - Government policy - History - Great Britain |
Commerce |
Business & Economics |
Commerce - General |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
Offering an account of the forerunner of the modern multinational, this book shows how the East India Company pioneered the model of the corporation that we see in modern times. It also articulates that the company's legacy shows how essential it is to break-up the contemporary over-mighty corporations. |
|
|
|
|
|
|
|
|
3. |
Record Nr. |
UNINA9910786684903321 |
|
|
Autore |
Blunden Bill |
|
|
Titolo |
Behold a pale farce : cyberwar, threat inflation, & the malware industrial complex / / Bill Blunden, Violet Cheung |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Walterville, OR : , : Trine Day, , [2014] |
|
©2014 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (835 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Information warfare |
Computer security - United States |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di contenuto |
|
CoverImage; Title Page; Copyright page; Dedication; Epigraph; Table of Contents; Media Massage; Firsthand Experience; The Public Relations Industry; Behold a Pale Farce; Organization; Acknowledgments; The Wonder of it All; Part I - Rampant Hyperbole; A Backdrop of Metaphors; Never Mind: False Alarm; The Madness of Crowds; An Electronic Pearl Harbor; A Cyber-Katrina; The Hiroshima of Cyberwar; A Cyber 9/11; Dissenting Voices; The Executive Responds; Stuxnet; Plan X; Presidential Policy Directive 20; Hacking Foreign Targets for Years; Oz the Great and Powerful; Our Frenemy in Asia |
A Plurality of ActorsRule of Law Breaks Down; The Internet's Frontier Town; Opposing Models for Reform; The Extent of China's Capabilities; Joined at the Hip; Both Sides Keep the Other in Business; The #1 Threat |
|
|
|
|
|
|
|
|
|
|
|
to Economic Security?; Cyberwar as a Misdiagnosis; Dialing 911; Looking Ahead; Part II - A Series of Unfortunate Events; Cybercrime; The Ecosystem; A Snapshot of Cybercrime; The TJX Hack; The Heartland Payment Systems Breach; The DarkMarket Sting; The RBS WorldPay Attack; The Return of the Analyzer; The Ballad of Max Butler; Sony under Siege; The FIS Breach; The Big Picture |
The Punch LineEspionage; Moonlight Maze; Titan Rain; Operation Byzantine Hades; GhostNet; Joint Strike Fighter Breach; Operation Aurora; Shadows in the Cloud; Night Dragon; RSA and SecurID; Operation Shady RAT; The Nitro Attacks; Targeting Certificate Authorities; Operation Red October; Patterns Emerge; The Scope of U.S. Espionage; The Malware-Industrial Complex; Independent Operators; Spies Abound ...; But Some Groups Spy More Than Others; The Infrastructure; The Financial System; The Power Grid; The Telecoms; Aerospace; The Internet: Denial of Service Attacks; McAfee |
The Internet: Manipulating TrafficThreat Inflation; Conflicts of Interest; Part III - The Futility of Offensive Solutions; The Quandary of Attribution; Achieving Anonymity Online; The Origins of Tor; The Folly of Attribution; Deterrence; Arms Control Treaties; Shades of Orwell; The Golden Age of Surveillance; The NSA's MUSCULAR project; Opting Into Surveillance; The DHS Monitors Social Media; Corporate Compliance; The Hemisphere Project; A Global Panopticon; Coda: Extorting Privacy; Part IV - The Road to Cyber-Security; The Origins of Cyber-Insecurity; A Layered Perspective; Exciting Causes |
The Software DepressionPredisposing Causes; Remote Causes; Security for The 1%; Cyber-Security for The 99 Percent; Building Resilient Software; Echoes of Ken Thompson; International Cooperation; Managing Externalities; Catch-22; Strength in Numbers; The Hazards of a Misdiagnosis; Securitization In-Depth; Threat Inflation; The Folly of Deterrence; In Search of Enemies; American Hypocrisy; Subverting Attribution; Turning to Big Brother; Root Causes of Cyber-Insecurity; Cyber-Security for the 1%; Cyber-Security for the 99%; Index |
|
|
|
|
|
|
Sommario/riassunto |
|
This book presents a data-driven message that exposes the cyberwar media campaign being directed by the Pentagon and its patronage networks. By demonstrating that the American public is being coerced by a threat that has been blown out of proportion-much like the run-up to the Gulf War or the global war on terror-this book discusses how the notion of cyberwar instills a crisis mentality that discourages formal risk assessment, making the public anxious and hence susceptible to ill-conceived solutions. With content that challenges conventional no |
|
|
|
|
|
|
|
| |