Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 3 of 3 matches in All Departments
There is a need within radio-frequency identification (RFID) and other smart technologies to understand related practical implications. Auto-Identification and Ubiquitous Computing Applications: RFID and Smart Technologies for Information Convergence reports on problems related to the primary use of RFID technologies. This book provides a detailed overview of RFID literature, specifically in using RFID and smart technologies for identification, and draws together several different fields of research across supply chain management, asset tracking, and novel use of RFID for identification.
Grit Blocs by Dave Parry showcases 100 of the finest must-do boulder problems on the gritstone outcrops, edges and quarries of the Pennines. The gritstone crags of Northern England are internationally renowned and are home to some of the best bouldering in the world. With an emphasis on high-quality photography, Grit Blocs presents a selection of the very best boulder problems in these areas - covering the Peak District, Yorkshire, Lancashire and North East England. The classic problems are there - Careless Torque on Stanage and Flying Arete at Almscliff - but, as the sport of bouldering continues to evolve, there are also lesser-known and newer gems to discover: Archery at West Nab, The Lash at Birk Gill and Ouzel Thorn at Thorn Crag, amongst others. The stunning photography is accompanied by texts that expand on the context and characteristics of the boulder problem and give you a flavour of what each problem is like, with a bit of bouldering history thrown in too. Let Grit Blocs inspire your next climbing adventure - whether you're a seasoned grit aficionado or new to the sport, you'll find something to engage and animate you.
Nearly forty percent of the world's 1 billion+ Internet users are
wireless. It's a truly staggering fact to think that the majority
of these wireless implementations are fundamentally insecure,
leaving users and private data at risk.
|
You may like...
|