 |
|
|
|
 Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... |  |  Ultrashort Laser Pulse Phenomena, Second Edition
Ultrashort Laser Pulse Phenomena serves as an introduction to the phenomena of ultrashort laser pulses and describes how this technology can be applied in areas such as spectroscopy, medical imaging, electromagnetism, optics, and quantum physics. Combining the principles with experimental techniques, the book serves as a guide to designing... |  |  |
|
 JUNOS Security
Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations... |  |  Computational Fluid Dynamics in Practice
Computational Fluid Dynamics in Practice explores the current and future developments in CFD, with the authors detailing advanced applications and case studies to demonstrate successes, illustrate the limitations, and identify methods for good practice. Designers, engineers, and researchers working in this field of fluid mechanics will... |  |  Ensemble Methods in Data Mining: Improving Accuracy Through Combining Predictions
Ensemble methods have been called the most influential development in Data Mining and Machine Learning in the past decade. They combine multiple models into one usually more accurate than the best of its components. Ensembles can provide a critical boost to industrial challenges -- from investment timing to drug discovery, and fraud detection... |
|
| Result Page: 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 47 46 45 44 |