|
|
|
|
Linux EmailMany businesses want to run their email servers on Linux for greater control and flexibility of corporate communications, but getting started can be complicated. The attractiveness of a free-to-use and robust email service running on Linux can be undermined by the apparent technical challenges involved. Some of the complexity arises from the fact... | | Plan, Activity, and Intent Recognition: Theory and Practice
Plan recognition, activity recognition, and intent recognition together combine and unify techniques from user modeling, machine vision, intelligent user interfaces, human/computer interaction, autonomous and multi-agent systems, natural language understanding, and machine learning.
Plan, Activity, and Intent Recognition... | | Raspberry Pi for Secret Agents
Turn your Raspberry Pi into your very own secret agent toolbox with this set of exciting projects!
Overview
-
Detect an intruder on camera and set off an alarm
-
Listen in or record conversations from a distance
-
Find out what the other computers on your network are up to
... |
|
|
| | Unity 5.x Game AI Programming Cookbook
Key Features
-
Empower your agent with decision making capabilities using advanced minimaxing and Negamaxing techniques
-
Discover how AI can be applied to a wide range of games to make them more interactive.
-
Instigate vision and hearing abilities in your agent through collider based and graph
... | | Cisco Security AgentPrevent security breaches by protecting endpoint systems with Cisco Security Agent (CSA), the Cisco host Intrusion Prevention System Learn the basics of endpoint security and why it is so important in today's security landscape Protect endpoint systems from hackers, viruses, and worms with host intrusion prevention security Prevent... |
|
The State of the Art in Intrusion Prevention and Detection
The State of the Art in Intrusion Prevention and Detection analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in... | | Computational Logic in Multi-Agent Systems: 4th International Workshop, CLIMA IV, Fort Lauderdale, FL, USA, January 6-7, 2004This book constitutes the strictly refereed post-proceedings of the 4th International Workshop on Computational Logic for Multi-Agent Systems, CLIMA IV, held in Fort Lauderdale, Fl, USA in January 2004.
The 11 revised full papers presented together with 2 invited papers were carefully selected during two rounds of reviewing and improvement. The... | | Malware Forensics: Investigating and Analyzing Malicious Code
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and... |
|
|
Result Page: 11 10 9 8 7 6 5 4 3 2 1 |