Intelligent Complex Adaptive Systems
I don’t believe in the existence of a complex systems theory as such and, so
far, I’m still referring to complex systems science (CSS) in order to describe
my research endeavours. In my view, the latter is constituted, up until now,
by a bundle of loosely connected methods and theories aiming to observe—
from... Ethical Hacking and Countermeasures: Attack Phases (EC-Council Press)
The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of five books covering a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures. The content of this series is designed to immerse the reader into an interactive environment where they will be shown how to scan,...
RFID For Dummies Somewhere, separated from you by just a few degrees, is not Kevin Bacon,
but an 800-pound gorilla demanding that you adopt radio frequency identification,
or RFID — a technology you may have never even heard of until
just a few months ago. Chances are that gorilla wears a stylish blue smock
with a yellow smiley face on it...
|Result Page: 34 33 32 31 30 29 28 27 26 25 |