The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application...
Artificial General Intelligence (AGI) research focuses on the original and ultimate
goal of AI – to create broad human-like and transhuman intelligence, by exploring
all available paths, including theoretical and experimental computer science,
cognitive science, neuroscience, and innovative interdisciplinary methodologies....
Learning OpenCV puts you right in the middle of the rapidly expanding field of computer vision. Written by the creators of OpenCV, the widely used free open-source library, this book introduces you to computer vision and demonstrates how you can quickly build applications that enable computers to "see" and make decisions based on the...
Common Design Patterns for Symbian OS is the first design patterns book that addresses Symbian OS specifically. It introduces programmers to the common design patterns that help implement a large variety of applications and services on Symbian OS. The goal of the book is to provide the experience of Symbian's developers to a wider audience...
Tills book covers the JavaScript language and the JavaScript APIs implemented by web
browsers. I wrote it for readers with at least some prior programming experience who
want to learn JavaScript and also for programmers who already use JavaScript but want
to take their understanding to a new level and really master the language and the...
"Floyd has answered for many in this book a way to both understand and use the Commitment of Traders reports. In my thirty-five years as a registered broker and author of my own book, I find that at times someone takes a complex subject and makes it easier to understand. Floyd has done this with his book. Not only does he make...
Many challenging problems in information systems engineering involve the manipulation of complex metadata artifacts or models, such as database schema, interface specifications, or object diagrams, and mappings between models. Applications solving metadata manipulation problems are complex and hard to build. The goal of generic model management is...
Network synchronization deals with the distribution of time and frequency across a network of clocks often spread over a wide geographical area. The goal is to align (i.e. synchronize) the time and frequency scales of all clocks, by using the communication capacity of their interconnecting links.
The JEE (Main & Advanced) is one of the hardest exams to crack for
students, for a very simple reason – concepts cannot be learned by rote,
they have to be absorbed, and IIT believes in strong concepts. Each
question in the JEE (Main & Advanced) entrance exam is meant to push
the analytical ability of the student to...
Welcome to the fascinating world of open-source software that is Linux. In this book, we introduce you to the wonders of the Linux operating system, originally created as a labor of love by Linus Torvalds in the early 1990s. Our goal is to initiate you into the rapidly growing ranks of Linux users and enthusiasts busily rewriting the rules for the...
Digital electronic devices such as mobile phones, video game consoles, and network routers typically contain one or more electronic (integrated circuit) chips that are composed of several components such as processors, dedicated hardware engines and memory, and are referred to as system-on-chip (SoC). These SoC designs are rapidly becoming...
This book provides a conceptual framework for understanding and studying the pharmacogenetics of psychotropic drugs, reviews advances in the field, and describes the findings that have already emerged. Coverage extends to antipsychotics, antidepressants and mood stabilizing, cognitive-enhancing and anxiolytic drugs. The volume also examines...