“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...
Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not...
âThis volume covers some of the topics that are related to the rapidly growing field of biomedical informatics. In June 11-12, 2010 a workshop entitled ‘Optimization and Data Analysis in Biomedical Informatics’ was organized at The Fields Institute. Following this event invited contributions were gathered based on the talks...
DCOM -- the Distributed Component Object Model -- is a recent upgrade of a time-honored and well-tested technology promoted by Microsoft for distributed object programming. Now that components are playing a larger and larger part in Windows 98, Windows NT 4.0, and Windows 2000, every Windows programmer will want to understand the...
Don't let success put your company on the road to ruin
In Seduced by Success, Robert J. Herbold, the former Chief Operating Officer of Microsoft, shows you how to avoid the nine traps of success-the “legacy practices” that almost felled such giants as General Motors, Kodak and Sony. Herbold, a...
Driven by the increasing demand for capacity and Quality of Service in wireless cellular networks and motivated by the distributed antenna system, the authors proposed a cooperative communication architecture? Group Cell architecture, which was initially brought forward in 2001. Years later, Coordinated Multiple-Point Transmission and...
Recently, there has been a major push to integrate circuitry and digital signal processors on a single chip to improve wireless digital transmission. CMOS (complementary metal oxide semiconductor) is a key digital integrated circuit technology that is widely used throughout the wireless communications industry. This practical resource offers...
The cryptosystems based on the Integer Factorization Problem (IFP), the Discrete Logarithm Problem (DLP) and the Elliptic Curve Discrete Logarithm Problem (ECDLP) are essentially the only three types of practical public-key cryptosystems in use. The security of these cryptosystems relies heavily on these three infeasible problems, as no...
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power...
This is a textbook on electromagnetics for undergraduate students in electrical engineering, information, and communications. The book contents are very compact and brief compared to other commonly known electromagnetic books for undergraduate students and emphasizes mathematical aspects of basic electromagnetic theory. The book presents...
Dynamic secrets are constantly generated and updated from messages exchanged between two communication users. When dynamic secrets are used as a complement to existing secure communication systems, a stolen key or password can be quickly and automatically reverted to its secret status without disrupting communication. "Dynamic Secrets in...