 |
|
|
|
 Wireless Crime and Forensic Investigation
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. However, based on the broad reach of wireless, stopping someone from passively listening is just as critical. Intrusion detection systems, firewalls, and forensics are just a few of the... |  |  Machine Learning for Email: Spam Filtering and Priority Inbox
To explain the perspective from which this book was written, it will be helpful to define
the terms machine learning and hackers.
What is machine learning? At the highest level of abstraction, we can think of machine
learning as a set of tools and methods that attempt to infer patterns and extract ... |  |  Engineering Optics (Springer Series in Optical Sciences)
Engineering Optics is a book for students who want to apply their knowledge of optics to engineering problems, as well as for engineering students who want to acquire the basic principles of optics. It covers such important topics as optical signal processing, holography, tomography, holographic radars, fiber optical communication, electro-... |
|
 |  |  Contemporary Cryptology (Advanced Courses in Mathematics - CRM Barcelona)
In February 2004, at the Universitat Polit`ecnica de Catalunya, we presented a
45-hour Advanced Course on Contemporary Cryptology, organised by the Centre
de Recerca Matem`atica. This volume is an expanded and unified version of the
material presented in the lectures and the background material that we distributed
among the... |  |  |
|
Result Page: 279 278 277 276 275 274 273 272 271 270 269 268 267 266 265 264 263 262 261 |