In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found...
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the...
Explore the multidisciplinary nature of complex networks through machine learning techniques
Statistical and Machine Learning Approaches for Network Analysis provides an accessible framework for structurally analyzing graphs by bringing together known and novel approaches on graph classes and graph measures for...
The area of aggregation operations is one of the most promising off-springs of
fuzzy sets theory. Before Zadeh introduced fuzzy set connectives in 1965, there
was a wide gap between logic and decision sciences. On the one hand, multiplevalued
logics proposed many-valued extensions of the conjunctions and
disjunctions for which the...
Although there are many books on mathematical finance, few deal with the statistical aspects of modern data analysis as applied to financial problems. This textbook fills this gap by addressing some of the most challenging issues facing financial engineers. It shows how sophisticated mathematics and modern statistical techniques can...
With its flexible capabilities and open-source platform, R has become a major tool for analyzing detailed, high-quality baseball data. Analyzing Baseball Data with R provides an introduction to R for sabermetricians, baseball enthusiasts, and students interested in exploring the rich sources of baseball data. It...
Packed with insider tips and tricks, this how-to guide is fully revised to cover the latest version of Google Analytics and shows you how to implement proven Web analytics methods and concepts.
This second edition of the bestselling Advanced Web Metrics with Google Analytics is the perfect book for marketers, vendors,...
This book discusses the relationship between construction quality and the state of the Singapore national economy, and describes how construction quality is affected as contracting firms strategically manage issues relating to profitability and survivability during economic boom and bust cycles.
Measures of software internal attributes have been extensively used to help software managers, customers and users to characterize, assess and improve the quality of software products. The introduction of object-oriented (OO) software provides powerful design mechanisms with which to do this, and new technologies—e.g., OO frameworks, OO...
When looking at an organization's security needs, you should begin with any existing security policies or procedures that the organization might already have in place. We started this chapter with an in-depth examination of how to analyze a company's business requirements for network and data security. This included looking at these existing...
Adaptive filters with a large number of coefficients are usually involved in both network and acoustic echo cancellation. Consequently, it is important to improve the convergence rate and tracking of the conventional algorithms used for these applications. This can be achieved by exploiting the sparseness character of the echo paths....
Being Agile is your roadmap to successfully transforming your organization to an Agile culture. Veteran agile coach Mario Moreira teaches new adopters how to implement a robust Agile framework to derive from it the maximum business benefit in terms of customer value, revenue, and employee engagement.