Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise...
A Systems Engineering Approach to Wireless Information Networks
The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...
Change detection using remotely sensed images has many applications, such as urban monitoring, land-cover change analysis, and disaster management. This work investigates two-dimensional change detection methods. The existing methods in the literature are grouped into four categories: pixel-based, transformation-based, texture analysis-based,...
Foot-and-mouth disease (FMD) has been recognized in printed records dating from the sixteenth century, and since the eradication of rinderpest (cattle plague) in the early part of the twentieth century it has been rec- nized as the most important and feared disease of cattle and other dom- tic livestock. The beginning of the twenty-first...
This 3rd edition of the very popular title "Securing & Optimizing Linux" looks for security measures that go beyond firewalls and intrusion detection systems to anticipate and protect against upcoming threats. Securing & Optimizing Linux: The Hacking Solution: A hacker's guide to protect your Linux server designed for system...
The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention
Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments....
Ultrashort pulses in mode-locked lasers are receiving focused attention from researchers looking to apply them in a variety of fields, from optical clock technology to measurements of the fundamental constants of nature and ultrahigh-speed optical communications. Ultrashort pulses are especially important for the next generation of...
This book, written by experts in the field, is based on the latest research on the analysis and synthesis of switched time-delay systems. It covers the stability, filtering, fault detection and control problems, which are studied using the average dwell time approach. It presents both the continuous-time and discrete-time systems and...
Traditional data mining methods are designed to deal with “static” databases, i.e. databases where the ordering of records (or other database objects) has nothing to do with the patterns of interest. Though the assumption of order irrelevance may be sufficiently accurate in some applications, there are certainly many other cases, where...
As far back as 1999, some smart guys predicted that mobile would become the primary focus of development in only a few years. Although it has taken a bit more time than expected, the era of mobile software has arrived at last. Why did it take so long? The answer is surprisingly simple: mobile software needed a critical mass of users...
Graphs are among the most important abstract data types in computer science, and the algorithms that operate on them are critical to modern life. Graphs have been shown to be powerful tools for modeling complex problems because of their simplicity and generality. Graph algorithms are one of the pillars of mathematics, informing research in...
Overall an excellent book, a lot of valuable information…I would give the book 9 out of a possible 10 stars … Well organized and well written, the ideas and concepts flow in a methodical and progressive manner. … for those who have an interest in the subject matter, the book is a pleasure to read. …Excellent and...