Security Assessment: Case Studies for Implementing the NSA IAM The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or... Technical Java: Applications for Science and Engineering If you want to use Java todevelop scientific or engineering programs, Technical Java is the Java guide you’vebeen searching for. Using real-life examples, expert scientific programmerGrant Palmer shows how to build powerful, versatile, and flexible software forvirtually any technical application. Whether you’re moving from FORTRAN,C, or... The Nine Numbers of the Cosmos "Drawing upon Descartes's saying, 'What do I know?' Rowan-Robinson asks what we know about the universe. In answer, he has come up with nine numbers that summarize our current understanding of the cosmos. . . . The numbers Rowan-Robinson presents are grounded in scientific research, although more than a little speculation was used in deriving...
Fundamentals of Electric Circuits
You may be wondering why we chose a photo of astronauts working
in space on the Space Station for the cover. We actually chose it for
several reasons. Obviously, it is very exciting; in fact, space represents
the most exciting frontier for the entire world! In addition, much of the
station itself consists of all kinds of circuits! One...
The Martians of Science: Five Physicists Who Changed the Twentieth Century If science has the equivalent of a Bloomsbury group, it is the five men born at the turn of the twentieth century in Budapest: Theodore von Karman, Leo Szilard, Eugene Wigner, John von Neumann, and Edward Teller. From Hungary to Germany to the United States, they remained friends and continued to work together and influence each other throughout... Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open...
Kalman Filter Recent Advances and Applications
The discussion about the manned spacecraft program was initiated at NASA in 1959.
Only one year later, Dr. Kalman and Dr. Schmidt linked the linear Kalman filter and the
perturbation theory in order to obtain the Kalman-Schmidt filter, currently known as the
extended Kalman filter. This approach would be implemented in 1961 using an... Assessing the Value of E-learning Systems Assessing the Value of E-Learning Systems provides an extensive literature review pulling theories from the field of information systems, psychology and cognitive sciences, distance and online learning, as well as marketing and decision sciences. This book provides empirical evidence for the power of measuring value in the context of e-learning...
|Result Page: 11 10 9 8 7 6 5 4 3 2 |