This book covers the principles of modeling and simulation of nonlinear distortion in wireless communication systems with MATLAB simulations and techniques
In this book, the author describes the principles of modeling and simulation of nonlinear distortion in single and multichannel wireless communication systems using both...
This book continues to provide a forum, which a recent book, Software Evolution with UML and XML, started, where expert insights are presented on the subject. In that book, initial efforts were made to link together three current phenomena: software evolution, UML, and XML. In this book, focus will be on the practical side of ...
Software quality, by its very nature, is elusive. Add to that the issue of ever-changing user requirements and the vagaries of software project management and "quality" can easily become a mere word on a distant horizon. This highly acclaimed book demonstrates how the Unified Modeling Language (UML) can be used within a process...
The Software Engineering Handbook is written for software developers; unlike many other texts, it is written to be used in developers everyday work. Care has been taken to reference outside sources consulted for the text, easily leading readers to more detailed information when needed. This book is recommended for libraries that serve IT...
Solving multi-objective problems is an evolving effort, and computer science and other related disciplines have given rise to many powerful deterministic and stochastic techniques for addressing these large-dimensional optimization problems. Evolutionary algorithms are one such generic stochastic approach that has proven to be successful and widely...
Canada is a well-endowed country that serves as an ideal model to lead the reader through the development of energy, resources, and society historically and into a post-carbon future. The book provides an historical perspective and describes the physical resource limitations, energy budgets, and climate realities that will...
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically...
This book presents a total systems approach to the all the topics needed for the infosec professional, beginning with defining the position of the information systems security officer (ISSO), to establishing and managing an infosec program.
* Six new chapters present the latest information and resources to counter information security...
Get the latest information about using the #1 web analytics tool from this fully updated guide
Google Analytics is the free tool used by millions of web site owners to assess the effectiveness of their efforts. Its revised interface and new features will offer even more ways to increase the value of your web site, and this...