For a sophisticated view of networking design concepts that goes from lofty to granular in the blink of an eye, Network Design and Case Studies is a sure winner. This mammoth entry in Cisco's growing collection of reference books provides equal parts academic theory and practical application.
In an age when so much communication is tethered to
technology, delivering messages face-to-face has paradoxically
become even more vital to professional success. We all have ready
access to more information than any of our ancestors did. At the
click of a few keys, we can locate reams of facts on any topic under
the sun. But...
This edited volume assesses capabilities of data mining algorithms for spatial modeling of natural hazards in different countries based on a collection of essays written by experts in the field. The book is organized on different hazards including landslides, flood, forest fire, land subsidence, earthquake, and gully erosion. Chapters were...
Information is power - you know that. But, how do you research the best Disaster Recovery strategies, without spending too much of your time (and money) on it? The average person earns $ 1100 per week, which equates to $ 27 per hour. Trying to do the research yourself would take you at least 5 hours to come up with the best information, AND...
With the economic crisis that began in 2008, a long-standing trend toward increased regulation is becoming a flood. The clamor for improved enterprise risk management and the complexity of multinational compliance present executives with a dramatically new array of challenges.
Governance should offer solutions, but it is clear that...
Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex...
Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...
Audio/Video (AV) systems and Information Technology (IT) are colliding. Broadcasters and other AV professionals are impacted by the transition to IT components and techniques. This is the first book to focus on the intersection of AV and IT concepts. It includes technology reviews and the tools to understand and evaluate key aspects of hybrid AV...
BRAND NEW HARDBACKWe can know the essential truth of President John F. Kennedy's assassination. That truth can set us free.
Thanks to the pioneer investigators into President Kennedy's murder, the truth-telling of many witnesses, and a recent flood of documents through the JFK Records Act, the truth is available. Not only can the...
As a developer, you are aware of the increasing concern amongst developers and site architects that websites be able to handle the vast number of visitors that flood the Internet on a daily basis. Scalable Internet Architecture addresses these concerns by teaching you both good and bad design methodologies for...
The Cult of Cthulhu shall never die. Its untenable spirit, unearthly and ichorous, is spreading far and wide through the Matrix-esque reality program that we are immersed in. As you read these words, try to wake up from the illusions surrounding you. This book is our manifesto, our truth, our bible! Cthulhu Cult is the integration of H.P....
This book presents theoretical and practical results of information theoretic methods
used in the context of statistical learning. Its major goal is to advocate and promote
the importance and usefulness of information theoretic concepts for understanding
and developing the sophisticated machine learning methods necessary not only...