Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Network Security Fundamentals
Network Security Fundamentals

Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...

Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Towards location aware mobile ad hoc sensors

A Systems Engineering Approach to Wireless Information Networks

The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...

Two-Dimensional Change Detection Methods: Remote Sensing Applications (SpringerBriefs in Computer Science)
Two-Dimensional Change Detection Methods: Remote Sensing Applications (SpringerBriefs in Computer Science)

Change detection using remotely sensed images has many applications, such as urban monitoring, land-cover change analysis, and disaster management. This work investigates two-dimensional change detection methods. The existing methods in the literature are grouped into four categories: pixel-based, transformation-based, texture analysis-based,...

Foot-and-Mouth Disease Virus (Current Topics in Microbiology and Immunology)
Foot-and-Mouth Disease Virus (Current Topics in Microbiology and Immunology)

Foot-and-mouth disease (FMD) has been recognized in printed records dating from the sixteenth century, and since the eradication of rinderpest (cattle plague) in the early part of the twentieth century it has been rec- nized as the most important and feared disease of cattle and other dom- tic livestock. The beginning of the twenty-first...

Securing & Optimizing Linux: The Hacking Solution
Securing & Optimizing Linux: The Hacking Solution
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention

 

Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....

Ultra-Fast Fiber Lasers: Principles and Applications with MATLAB® Models (Optics and Photonics)
Ultra-Fast Fiber Lasers: Principles and Applications with MATLAB® Models (Optics and Photonics)

Ultrashort pulses in mode-locked lasers are receiving focused attention from researchers looking to apply them in a variety of fields, from optical clock technology to measurements of the fundamental constants of nature and ultrahigh-speed optical communications. Ultrashort pulses are especially important for the next generation of...

Analysis and Synthesis of Switched Time-Delay Systems: The Average Dwell Time Approach (Studies in Systems, Decision and Control, 146)
Analysis and Synthesis of Switched Time-Delay Systems: The Average Dwell Time Approach (Studies in Systems, Decision and Control, 146)
This book, written by experts in the field, is based on the latest research on the analysis and synthesis of switched time-delay systems. It covers the stability, filtering, fault detection and control problems, which are studied using the average dwell time approach. It presents both the continuous-time and discrete-time systems and...
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Data Mining In Time Series Databases (Series in Machine Perception and Artificial Intelligence)
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
Architecting Mobile Solutions for the Enterprise
Architecting Mobile Solutions for the Enterprise
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...
Graph Algorithms in the Language of Linear Algebra (Software, Environments, and Tools)
Graph Algorithms in the Language of Linear Algebra (Software, Environments, and Tools)

Graphs are among the most important abstract data types in computer science, and the algorithms that operate on them are critical to modern life. Graphs have been shown to be powerful tools for modeling complex problems because of their simplicity and generality. Graph algorithms are one of the pillars of mathematics, informing research in...

Asset Protection and Security Management Handbook
Asset Protection and Security Management Handbook
Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...
unlimited object storage image
Result Page: 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy