Catalog Search Results
10) Teleportation
Author
Publisher
Bellwether Media
Pub. Date
2021.
Language
English
Description
"Engaging images accompany information about teleportation. Are we there yet? You've been in the car for hours. If only you could teleport to your destination. One day it might be possible. Through leveled text and engaging photos this title introduces readers to the exciting possibilities of teleportation. It highlights the use of teleportation in fiction describes the science behind the superpower and explores how teleportation may one day be possible....
Author
Series
Publisher
Gareth Stevens Publishing
Pub. Date
2023.
Language
English
Description
"From our homes and schools to stores and restaurants, Wi-Fi has changed how we send and receive information and how we stay connected to the internet and each other. The story of Wi-Fi begins as far back as the discovery of radio waves. Readers will learn how it developed from there and gain an appreciation for the invisible world behind the wireless computer technology we rely on"--Provided by publisher.
15) The wireless networking starter kit: the practical guide to Wi-Fi networks for Windows and Macintosh
Publisher
Peachpit Press
Pub. Date
[2003-]
Language
English
Author
Series
Publisher
Amicus/Amicus Ink
Pub. Date
[2020]
Language
English
Description
"Elementary readers will follow the sequence of how wireless technologies have brought us from the first Morse code radio transmission to today's "Internet of Things." Engaging photographs and a running timeline illustrate important inventions that have changed the way we use radio waves, from Bluetooth connections to cell phones. A glossary, further resources, and an index are included"--
Author
Publisher
McGraw-Hill Education
Pub. Date
[2015]
Language
English
Description
"Exploit and defend against the latest wireless network attacks. Learn to exploit weaknesses in wireless network environments using the innovative techniques in this thoroughly updated guide. Inside, you'll find concise technical overviews, the latest attack methods, and ready-to-deploy countermeasures. Find out how to leverage wireless eavesdropping, break encryption systems, deliver remote exploits, and manipulate 802.11 clients, and learn how...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request