Observation of Traveling Ionospheric Disturbances by the Doppler Technique with Spaced Transmitters
Title | Observation of Traveling Ionospheric Disturbances by the Doppler Technique with Spaced Transmitters PDF eBook |
Author | John Emory Jones |
Publisher | |
Pages | 478 |
Release | 1969 |
Genre | Doppler radar |
ISBN |
This report describes a radio investigation of traveling ionospheric disturbances carried out near Boulder, Colorado, over a 1-year period from June 1967 to June 1968. The three-dimensional motions of F2 layer disturbances were measured by the high frequency Doppler technique with spaced transmitters and at several probing frequencies. Horizontal motions were determined by cross-correlating three signals on frequencies near 5 MHz, whose reflection points were approximately at the corners of a horizontal equilateral triangle with 40-km sides. Vertical motions were determined from cross-correlation of signals on frequencies of 3.3, 4.0, and 5.1 MHz, whose reflection points were aligned vertically.
Java Cryptography
Title | Java Cryptography PDF eBook |
Author | Jonathan Knudsen |
Publisher | "O'Reilly Media, Inc." |
Pages | 366 |
Release | 1998-05-01 |
Genre | Computers |
ISBN | 1449390617 |
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application programmer's arsenal. Cryptography provides three services that are crucial in secure programming. These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates, which prove identity (authentication); and digital signatures, which ensure your data has not been damaged or tampered with.This book covers cryptographic programming in Java. Java 1.1 and Java 1.2 provide extensive support for cryptography with an elegant architecture, the Java Cryptography Architecture (JCA). Another set of classes, the Java Cryptography Extension (JCE), provides additional cryptographic functionality. This book covers the JCA and the JCE from top to bottom, describing the use of the cryptographic classes as well as their innards.The book is designed for moderately experienced Java programmers who want to learn how to build cryptography into their applications. No prior knowledge of cryptography is assumed. The book is peppered with useful examples, ranging from simple demonstrations in the first chapter to full-blown applications in later chapters.Topics include: The Java Cryptography Architecture (JCA) The Java Cryptography Extension (JCE) Cryptographic providers The Sun key management tools Message digests, digital signatures, and certificates (X509v3) Block and stream ciphers Implementations of the ElGamal signature and cipher algorithms A network talk application that encrypts all data sent over the network An email application that encrypts its messages Covers JDK 1.2 and JCE 1.2.
SDL.
Title | SDL. PDF eBook |
Author | |
Publisher | |
Pages | 764 |
Release | 1970 |
Genre | Solar flares |
ISBN |
Technical Report
Title | Technical Report PDF eBook |
Author | National Institutes of Health (U.S.). Division of Computer Research and Technology |
Publisher | |
Pages | 44 |
Release | 1971-04 |
Genre | Computer programming |
ISBN |
A Computer Program (HEVSIM) for Heavy Duty Vehicle Fuel Economy and Performance Simulation. Volume III: Appendices A Through F. Final Report
Title | A Computer Program (HEVSIM) for Heavy Duty Vehicle Fuel Economy and Performance Simulation. Volume III: Appendices A Through F. Final Report PDF eBook |
Author | Richard E. Buck |
Publisher | |
Pages | 330 |
Release | 1981 |
Genre | |
ISBN |
Hiking the Sierra Nevada
Title | Hiking the Sierra Nevada PDF eBook |
Author | Barry Parr |
Publisher | Rowman & Littlefield |
Pages | 469 |
Release | 2022-06-01 |
Genre | Sports & Recreation |
ISBN | 1493062190 |
Thoroughly updated and revised, this four-season guide features over 100 of the best hikes from every quarter of the Sierra Nevada range, geared to differing levels of skill and experience. From foothill to desert, deep canyon to alpine mountaintop, author Barry Parr has compiled a list of fantastic hikes that illustrate the entirety of the range. This is one of the most comprehensive hiking guides to the Gold Country.
Proceedings
Title | Proceedings PDF eBook |
Author | |
Publisher | |
Pages | 218 |
Release | 1975 |
Genre | Computer engineering |
ISBN |