Build a better defense against motivated, organized, professional attacks
Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by...
Computer graphics involves simulating the distribution of light in a 3D
environment. There are only a few fundamentally different algorithms that
have survived the test of time. They can be loosely classified into projective
algorithms and image-space algorithms. The former class projects each geo
metric primitive onto the...
Lung cancer is the leading cause of cancer-related deaths in the United States. Filling a gap in the literature, this resource translates recent laboratory findings into practical applications for the prevention and control of lung cancer. Featuring chapters by seasoned researchers in the field, this reference reviews current advances in...
Management of Erectile Dysfunction in Clinical Practice is a short guide to erectile dysfunction (ED) and its management covering normal function and dysfunction, assessment, treatment options and interventions. ED is a symptom, not a disease and will have underlying causes such as hypertension, coronary artery disease, diabetes,...
This book introduces Local Binary Patterns (LBP), arguably one of the most powerful texture descriptors, and LBP variants. This volume provides the latest reviews of the literature and a presentation of some of the best LBP variants by researchers at the forefront of textual analysis research and research on LBP descriptors and variants. The...
Building on the successful top-down approach of previous editions, the Fourth Edition of Computer Networking continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts. With this edition, Kurose and Ross bring the...
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.
Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by...
“The truth can wait, for it lives a long life” (Arthur Schopenhauer, German philosopher, 1788-1860)
The philosopher Schopenhauer believed in the eventual triumph of truth, despite the disappointments engendered by his indifferent contemporaries. Two centuries later, we live in a time of accelerated changes, and we do not...
Biomedical Materials provides a comprehensive discussion of contemporary biomaterials research and development. Highlighting important topics associated with Engineering, Medicine and Surgery, this volume reaches a wide scope of professionals, researchers and graduate students involved with biomaterials. A pedagogical writing...
Problems of stochastic optimization and various mathematical aspects of risk are the main themes of this contributed volume. The readers learn about the recent results and techniques of optimal investment, risk measures and derivative pricing. There are also papers touching upon credit risk, martingale theory and limit theorems.
Low-temperature electronics has already been studied for more than five decades . Originally the main interest was in fundamental material properties at cryogenic temperatures . Although the real benefits of operating semiconductor devices were clearly demonstrated in the 1970s, a peak in activity occurred a decade later when the cryocompute...