Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Intrusion Detection Systems (Advances in Information Security)
Intrusion Detection Systems (Advances in Information Security)
In our world of ever-increasing Internet connectivity, there is an on-going threat of intrusion, denial of service attacks, or countless other abuses of computer and network resources. In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems (IDSs).

Intrusion...

Information Processing and Living Systems (Advances in Bioinformatics and Computational Biology)
Information Processing and Living Systems (Advances in Bioinformatics and Computational Biology)
Information processing and information flow occur in the course of an organism's development and throughout its lifespan. Organisms do not exist in isolation, but interact with each other constantly within a complex ecosystem. The relationships between organisms, such as those between prey or predator, host and parasite, and between mating...
Distributed Event-Based Systems
Distributed Event-Based Systems

In today’s world, services and data are integrated in ever new constellations, requiring the easy, flexible and scalable integration of autonomous, heterogeneous components into complex systems at any time.

Event-based architectures inherently decouple system components. Event-based components are not designed to work with specific...

Web 2.0 Security - Defending AJAX, RIA, AND SOA
Web 2.0 Security - Defending AJAX, RIA, AND SOA
Service-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security...
Screening and Preventive Diagnosis with Radiological Imaging (Medical Radiology / Diagnostic Imaging)
Screening and Preventive Diagnosis with Radiological Imaging (Medical Radiology / Diagnostic Imaging)

This book provides clinicians with a broader understanding of screening and preventive diagnosis using radiological imaging. The first part of the book is dedicated to the fundamentals of screening and preventive diagnosis. The second part of the book discusses the most important practical examples of radiological screening and surveillance,...

Mastering LibGDX Game Development
Mastering LibGDX Game Development

Leverage the power of LibGDX to create a fully functional, customizable RPG game for your own commercial title

About This Book

  • Learn game architecture and design patterns with concrete examples using proper software engineering principles
  • Save time and money with this handy reference...
Professional Rootkits (Programmer to Programmer)
Professional Rootkits (Programmer to Programmer)

Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for...

Introduction to Modern Liquid Chromatography
Introduction to Modern Liquid Chromatography

The latest edition of the authoritative reference to HPLC

High-performance liquid chromatography (HPLC) is today the leading technique for chemical analysis and related applications, with an ability to separate, analyze, and/or purify virtually any sample. Snyder and Kirkland's Introduction to Modern Liquid...

Detection Theory: Applications and Digital Signal Processing
Detection Theory: Applications and Digital Signal Processing

This book has its origin in lecture notes created at the Naval Postgraduate School (NPS), whose student and faculty support made The book is written for senior undergraduates and first dents. Practicing engineers should especially find the book the basic knowledge of detection and estimation theory. the text deals with detection aspects,...

Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
Human - Computer Systems Interaction: Backgrounds and Applications 2: Part 2 (Advances in Intelligent and Soft Computing)
It is demonstrated that spectral characteristics of steady-state visual evoked potentials (SSVEPs) in a brain-computer interface (SSVEP-based BCI) depend significantly on the stimulus parameters, such as color and frequency of its flashing light. We postulate these dependencies can be used to improve the BCI performance –...
Scala for Machine Learning
Scala for Machine Learning

Leverage Scala and Machine Learning to construct and study systems that can learn from data

About This Book

  • Explore a broad variety of data processing, machine learning, and genetic algorithms through diagrams, mathematical formulation, and source code
  • Leverage your expertise in Scala...
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.

This fully integrated book, CD, and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks.
...
unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy