Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you’ll explore ways to apply machine learning to security...
These days, we take for granted that our computer screensâand even our phonesâwill show us images in vibrant full color. Digital color is a fundamental part of how we use our devices, but we never give a thought to how it is produced or how it came about. ...
Despite the dramatic growth in the availability of powerful computer resources, the EM community lacks a comprehensive text on the computational techniques used to solve EM problems. The first edition of Numerical Techniques in Electromagnetics filled that gap and became the reference of choice for thousands of engineers,...
Streamline data analysis with an intuitive, visual Six Sigma strategy
Visual Six Sigma provides the statistical techniques that help you get more information from your data. A unique emphasis on the visual allows you to take a more active role in data-driven decision making, so you can leverage your contextual...
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
This book explores the emerging trends and patterns in online student evaluations of teaching and how online reviews have transformed the teacher-student relationship as developments in technology have altered consumer behaviors. While consumers at large rely more and more on web-based platforms to purchase commercial products and...
This book is designed as a reference manual that is exceptional in systematically discussing every aspect of nuclear medicine imaging of infections, with careful explanation of the most up-to-date concepts and recent guidelines on diagnostic flowcharts as shared between the EANM, ESR, ESNR, ESCMID, ESC, EACVI, ECCO, ESGAR and EBJIS....
Nietzsche was famously an atheist, despite coming from a strongly Protestant family. This heritage influenced much of his thought, but was it in fact the very thing that led him to his atheism? This work provides a radical re-assessment of Protestantism by documenting and extrapolating Nietzsche’s view that Christianity dies...
The book is based on interdisciplinary research on various aspects and dynamics of human multimodal signal exchanges. It discusses realistic application scenarios where human interaction is the focus, in order to
identify new methods for data processing and data flow coordination through synchronization, and...
This book provides an overview of model-based environmental visual perception for humanoid robots. The visual perception of a humanoid robot creates a bidirectional bridge connecting sensor signals with internal representations of environmental objects. The objective of such perception systems is to answer two fundamental...