Security Sage's Guide to Hardening the Network Infrastructure With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
Fuzzy Control Systems Must reading for anyone interested in acquiring a thorough understanding of fuzzy logic, its role in soft computing, and its application to control and related fields.
-Lotfi A. Zadeh
From the Foreword
Fuzzy Control Systems explores one of the most active areas of research involving fuzzy set theory. The...
The Developer's Guide to Debugging
Software has bugs. Period.
That's true, unfortunately. Even the good old "hello, world" program, known to virtually every C and C++ programmer in the world, can be considered to be buggy. Developing software means having to deal with defects; old ones, new ones, ones you created yourself, and those that others brought to life....