Reliability theory is a multidisciplinary science aimed at developing complex systems that are resistant to failures. Reliability engineering has emerged as a main field not only for scientists and researchers, but also for engineers and industrial managers. This book covers the recent developments in reliability engineering. It...
Introduces readers to the field of cyber modeling and simulation and examines current developmentsin the US and internationally
This book provides an overview of cyber modeling and simulation (M&S) developments. Using scenarios, courses of action (COAs), and current M&S and simulation environments,...
This book describes different approaches for solving industrial problems like product design, process optimization, quality enhancement, productivity improvement and cost minimization. Several optimization techniques are described. The book covers case studies on the applications of classical as well as evolutionary and swarm...
This book presents methods for optimising the spatial and network configuration of solar radiation measuring stations. Various physical and mathematical models are demonstrated, which together with high quality measurements, provide the essential tools to generate and validate solar resource estimates to improve the mapping of solar...
Engineering with polymers is a growing technical field which requires special knowledge. Filling a need, this ready reference brings together the hard-to-get and recently acquired knowledge usually only found scattered in the original literature. At the beginning, the reference introduces plastics as a class of technical materials,...
Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...
The University of Arizona Artificial Intelligence Lab (AI Lab) Dark Web project is a long-term scientific research program that aims to study and understand the international terrorism (Jihadist) phenomena via a computational, data-centric approach. We aim to collect "ALL" web content generated by international terrorist groups,...
What makes this book unique is how easy it makes it for you to learn. The author brings you a guide that takes you through a natural sequence of lessons, step-by-step, carefully explaining each concept and staying away from unnecessary technical jargon whilst defining the terms you need to learn. This one-step-at-a-time approach allows anyone...
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...
An airline is supposed to make the experience of booking a flight easy, trouble free, and reliable. But when scheduling software breaks down and flights get canceled, customers will walk, and heads will roll. That’s what Leigh Freemark faces the day she and her team launch a software upgrade that fails spectacularly and hits...
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...
Now in its fourth edition, C++ Programming: From Problem Analysis to Program Design remains the definitive text for CS1 courses. Best-selling author D.S. Malik employs a student-focused approach, using complete programming examples to teach introductory programming concepts. This fourth edition has been enhanced to further demonstrate the use...