 |
|
 Software Engineering for Image Processing Systems (Image Processing Series)
This book is not intended to be a traditional software engineering text — there are
many good ones. Instead, it is designed specifically for those involved in image
processing systems. It provides a modern engineering framework for the specification,
design, coding, testing, and maintenance of image processing software and... |  |  Network Safety: Network5 Safety Certification
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Compiler Specification and Verification (Lecture Notes in Computer Science)
About four years ago David Luckham hinted to me the possibility of verifying
a "real" compiler. At that time the idea seemed unrealistic, even absurd. After
looking closer at the problem and getting more familiar with the possibilities of
the Stanford verifier a verified compiler appeared not so impossible after all. In... |
|
 Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Penetration Testing: Procedures & Methodologies
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Introduction to Embedded Systems: Interfacing to the Freescale 9S12
Embedded computer systems are electronic systems that include a microcomputer to perform
specific dedicated tasks. The computer is hidden inside these products. Embedded
systems are ubiquitous. Every week millions of tiny computer chips come pouring out
of factories like Freescale, Microchip, Philips, Texas Instruments, Silicon Labs,... |
|
|
 Ecological Modeling for Resource Management
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research... |  |  Modeling Decision for Artificial Intelligence: 8th International Conference, MDAI 2011
This volume contains papers presented at the 8th International Conference on
Modeling Decisions for Artificial Intelligence (MDAI 2011), held in Changsha,
China, July 28-30. This conference followed MDAI 2004 (Barcelona, Catalonia,
Spain),MDAI 2005 (Tsukuba, Japan),MDAI 2006 (Tarragona,Catalonia, Spain),
MDAI 2007 (Kitakyushu,... |  |  Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Thank you for picking up this book! We believe that if you are reading this page, you are an individual seeking to gain a greater degree of familiarity with cybercrime and espionage, and more likely than not, believe that the realities outweigh the fear, uncertainty, and doubt associated with these two topics. Our desire in writing this... |
|
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |