MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...
An essential resource on the future of IP networks
Everyone agrees that Internet Protocol (IP) has played and will play a major role in the evolution of networks and services. The exact nature and scope of that role, however, remains a point of discussion. Assembling the foremost experts in their respective fields, editors Salah...
A superior primer on software testing and quality assurance, from integration to execution and automation
This important new work fills the pressing need for a user-friendly text that aims to provide software engineers, software quality professionals, software developers, and students with the fundamental developments in testing theory and...
In March 2005 about 40 scientists from Europe, Japan and the US came together the second time to discuss ways to achieve sustained performance on supercomputers in the range of Teraflops. The workshop held at the High Performance Computing Center Stuttgart (HLRS) was the second of this kind. The first one had been held in May 2004. At both...
An apprentice electrician prepares to become a journeyman typically during a four-year period. These four years include 2000 hours per year of on-the-job training, or a total of 8000 hours. During off-hours an apprentice studies electrical theory, methods, equipments, and the NEC.
As we embrace the world of personal, portable, and perplexingly complex digital systems, it has befallen upon the bewildered designer to take advantage of the available transistors to produce a system which is small, fast, cheap and correct, yet possesses increased functionality.
Increasingly, these systems have to consume little energy....
Authoritative Answers to All Your Linux Security Questions—Specifically for Linux Administrators
This is the most complete, most advanced guide to Linux security you’ll find anywhere. Written by a Linux security expert with over a decade of experience, Linux Security teaches you, step-by-step, all the...
Digital audio, video, images, and documents are flying through cyberspace to their respective owners. Unfortunately, along the way, individuals may choose to intervene and take this content for themselves. Digital watermarking and steganography technology greatly reduces the instances of this by limiting or eliminating the ability of third parties...
The development of computer programs for modeling antennas began in the 1960s when main-frame computers were making advancements. Modeling codes that could run on desktop computers made their appearance in the early 1980s. The design of directional antenna arrays for medium-frequency (MF) broadcasting stations has a much longer history, however,...
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital...
Pervasive and networked computers have dramatically reduced the cost of collecting and distributing large datasets. In this context, machine learning algorithms that scale poorly could simply become irrelevant. We need learning algorithms that scale linearly with the volume of the data while maintaining enough statistical efficiency to...
The world’s most widely adopted safety code, the National Electrical Code® (NEC) is now advancing electrical safety requirements with the 2008 edition in an effort to maximize public safety, emergency preparation, and electrical worker protection. With regulations for electrical wiring and equipment in virtually all types of buildings,...