Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

GARCH Models: Structure, Statistical Inference and Financial Applications
GARCH Models: Structure, Statistical Inference and Financial Applications

Provides a comprehensive and updated study of GARCH models and their applications in finance, covering new developments in the discipline

This book provides a comprehensive and systematic approach to understanding GARCH time series models and their applications whilst presenting the most advanced results...

Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
The C++ Programming Language: Special Edition (3rd Edition)
The C++ Programming Language: Special Edition (3rd Edition)

More than three-quarters of a million programmers have benefited from this book in all of its editions

 

Written by Bjarne Stroustrup, the creator of C++, this is the world's most trusted and widely read book on C++.

 

...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...
Multiplexed Networks for Embedded Systems: CAN, LIN, FlexRay, Safe-by-Wire...

Multiplexed networks are essential for the unified, efficient and cost-effective exchange of electronic information within embedded component systems. This is especially important in automotive manufacturing as vehicles become increasingly reliant on robust electronic networks and systems for improved reliability, anti-lock brake systems (ABS),...

System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)
System Reengineering in Healthcare: Application for Hospital Emergency Departments (Studies in Systems, Decision and Control)

This book presents an advanced systematic mapping review (SMR) and state-of-the-art taxonomy of emergency departments (EDs). Focusing on the patients’ level of fulfilment and how it can be enhanced, it examines existing problems like waiting periods and overcrowding and how these can be alleviated to provide a better service....

Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
Handbook of Multisensor Data Fusion: Theory and Practice, Second Edition (Electrical Engineering and Applied Signal Processing)
In the years since the bestselling first edition, fusion research and applications have adapted to service-oriented architectures and pushed the boundaries of situational modeling in human behavior, expanding into fields such as chemical and biological sensing, crisis management, and intelligent buildings.

Handbook of Multisensor Data...

RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
Big Data Forensics: Learning Hadoop Investigations
Big Data Forensics: Learning Hadoop Investigations

Perform forensic investigations on Hadoop clusters with cutting-edge tools and techniques

About This Book

  • Identify, collect, and analyze Hadoop evidence forensically
  • Learn about Hadoop's internals and Big Data file storage concepts
  • A step-by-step guide to help you...
The Variational Bayes Method in Signal Processing
The Variational Bayes Method in Signal Processing
This is the first book-length treatment of the Variational Bayes (VB) approximation in signal processing. It has been written as a self-contained, self-learning guide for academic and industrial research groups in signal processing, data analysis, machine learning, identification and control. It reviews the VB distributional approximation, showing...
GPU-Based Techniques for Global Illumination Effects (Synthesis Lectures on Computer Graphics)
GPU-Based Techniques for Global Illumination Effects (Synthesis Lectures on Computer Graphics)
Real-time rendering poses severe computational requirements to computers. In order to maintain a continuous looking motion for the human eye, at least 20 images need to be generated in each second. An image consists of about a million pixels, which means that for a single pixel the visible point and its color should be computed in less than 50 ns...
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras
Hands-On Transfer Learning with Python: Implement advanced deep learning and neural network models using TensorFlow and Keras

Deep learning simplified by taking supervised, unsupervised, and reinforcement learning to the next level using the Python ecosystem

Key Features

  • Build deep learning models with transfer learning principles in Python
  • implement transfer learning to solve real-world research...
Result Page: 35 34 33 32 31 30 29 28 27 26 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy