Projects--especially complex ones--are inherently risky. Between time constraints, technical challenges, and resource issues, things can easily go wrong--making the identification of potential risks an essential component of every project manager's job. Fully updated and consistent with the Risk Management Professional (RMP) certification...
Wring more out of the data with a scientific approach to analysis
Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the...
Risk and reward are always foremost in the determination of investment decisions and business transactions. Advances in the area of Information Communication Technologies (ICT) have enabled the development of new business paradigms. Such paradigms involve transactions taking place between loosely connected parties, often totally or partially...
Molecular Typing in Bacterial Infections covers common bacterial pathogenic agents, with the most effective methods for their identification and classification in the light of their specific epidemiology. The book will be a valuable resource for molecular typing of infectious diseases agents encountered in both the research and...
This volume presents a review of the latest numerical techniques used to identify ligand binding and protein complexation sites. It should be noted that there are many other theoretical studies devoted to predicting the activity of specific proteins and that useful protein data can be found in numerous databases. The aim of advanced...
When you know what hackers know, you're better able to protect your online information. With this book you'll learn just what Kali Linux is capable of and get the chance to use a host of recipes.
Overview
Recipes designed to educate you extensively on the penetration testing principles and Kali...
Similar to unraveling a math word problem, Security Intelligence: A Practitioner's Guide to Solving Enterprise Security Challenges guides you through a deciphering process that translates each security goal into a set of security variables, substitutes each variable with a specific security technology domain, formulates the...
Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...
Engineering Design, Planning and Management covers engineering design methodology with an interdisciplinary approach, concise discussions, and a visual format. The book covers the product design process in the context of both established companies and entrepreneurial start-ups. Readers will discover the usefulness of the design process...
The book consists of 19 extended and revised chapters based on original works presented during a poster session organized within the 5th International Conference on Computational Collective Intelligence that was held between 11 and 13 of September 2013 in Craiova, Romania. The book is divided into three parts. The first part is titled...
Automation systems, often referred to as SCADA systems, involve programming at several levels; these systems include computer type field controllers that monitor and control plant equipment such as conveyor systems, pumps, and user workstations that allow the user to monitor and control the equipment through color graphic displays. All of the...
Intelligent multimedia surveillance concerns the analysis of multiple sensing inputs including video and audio streams, radio-frequency identification (RFID), and depth data. These data are processed for the automated detection and tracking of people, vehicles, and other objects. The goal is to locate moving targets, to understand their...