Cyber Operations: Building, Defending, and Attacking Modern Computer Networks
Know how to set up, defend, and attack computer networks with this revised and expanded second edition.
You will learn to configure your network from the ground up, beginning with developing your own private virtual test environment, then setting up your own DNS server and AD infrastructure. You will continue with more...
A Century of Electrical Engineering and Computer Science at MIT, 1882-1982
The book's text and many photographs introduce readers to the renowned teachers and researchers who are still well known in engineering circles.
Electrical engineering is a protean profession. Today the field embraces many disciplines that seem far removed from its roots in the telegraph, telephone, electric...
Evolutionary Computation 1: Basic Algorithms and Operators
The original Handbook of Evolutionary Computation (Back et a1 1997) was
designed to fulfil1 the need for a broad-based reference book reflecting the
important role that evolutionary computation plays in a variety of disciplinesranging
from the natural sciences and engineering to evolutionary biology and
Exploring Abstract Algebra With Mathematica®
This upper-division laboratory supplement for courses in abstract algebra consists of several Mathematica packages programmed as a foundation for group and ring theory. Additionally, the "user's guide" illustrates the functionality of the underlying code, while the lab portion of the book reflects the contents of the... Bluetooth Essentials for Programmers This book provides an introduction to Bluetooth programming, with a specific focus on developing real code. The authors discuss the major concepts and techniques involved in Bluetooth programming, with special emphasis on how they relate to other networking technologies. They provide specific descriptions and examples for creating applications in...
Practical Genetic Algorithms
"The first introductory-level book to emphasize practical applications through the use of example problems."
–– International Journal of General Systems, Vol. 31, No. 1, 2002, on the first edition
The use of genetic algorithms (GAs) to solve large and often complex computational problems has given rise...
The Art of Computer Virus Research and Defense
Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...
Guide to Computer Network Security (Computer Communications and Networks)
This comprehensive guide exposes the security risks and vulnerabilities of computer networks and networked devices, offering advice on developing improved algorithms and best practices for enhancing system security. Fully revised and updated, this new edition embraces a broader view of computer networks that encompasses agile mobile systems...
|Result Page: 58 57 56 55 54 53 52 51 50 49 |