The balance between risk and reward is the very essence of business: you have to take risks
in order to generate returns and, generally speaking, higher returns involve greater risks.
However, there is a difference between risks taken as a result of careful judgement and
those taken unwittingly.
The leading text in the field explains step by step how to write software that responds in real time
From power plants to medicine to avionics, the world increasingly depends on computer systems that can compute and respond to various excitations in real time. The Fourth Edition of Real-Time Systems Design and...
Optical Network Control is the first expert guide and single-source reference for controlling and managing optical networks. This book fills the gap between optical network engineering and routing/signaling-helping both optical and IP professionals build networks that are more robust, flexible, manageable, and profitable. Coverage includes:...
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications,...
This book will show you how to use OpenCVs Python bindings to capture video, manipulate images, and track objects with either a normal webcam or a specialized depth sensor, such as the Microsoft Kinect. OpenCV is an open source, cross-platform libran' that provides building blocks for computer vision experiments and applications. It...
Thinking Objects: Contemporary Approaches to Product Design explores the many approaches designers take to their work, deconstructing the design process. How do objects “communicate” to us? This book reveals how designers can learn to read the signals an object sends, interpret meaning, and discover historical context, and...
The seven essential tools for keeping projects on time and under budget
You're executing risk management, leadership, and planning--all hallmarks of outstanding project management. And yet you're still having trouble keeping your projects on schedule.
Creative Project Management adds two new elements to...
Simulation based on mathematical models plays a major role in computer aided design of integrated circuits (ICs). Decreasing structure sizes, increasing packing densities and driving frequencies require the use of refined mathematical models, and to take into account secondary, parasitic effects. This leads to very high dimensional problems...
Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types,...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify...
The field of multidimensional data structures is large and growing very quickly. Here, for the first time, is a thorough treatment of multidimensional point data, object and image-based representations, intervals and small rectangles, and high-dimensional datasets. The book includes a thorough introduction; a comprehensive survey to spatial...
The most comprehensive book on state-of-the-art smart card technology available
Updated with new international standards and specifications, this essential fourth edition now covers all aspects of smart card in a completely revised structure. Its enlarged coverage now includes smart cards for passports and ID cards, health...