Home | Amazing | Today | Tags | Publishers | Years | Search 
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN Switch Security: What Hackers Know About Your Switches (Networking Technology: Security)
LAN and Ethernet switches are usually considered as plumbing. They are easy to install and configure, but it is easy to forget about security when things appear to be simple.

Multiple vulnerabilities exist in Ethernet switches. Attack tools to exploit them started to appear a couple of years ago (for example, the well-known dsniff
...
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
Articulation and Intelligibility (Synthesis Lectures on Speech and Audio Processing)
This lecture is a review of what is known about modeling human speech recognition (HSR). A model is proposed, and data are tested against the model.

There seem to be a large number of theories, or points of view, on how human speech recognition functions, yet few of these theories are comprehensive. What is needed is a set of models that are...

Software Reflected: The Socially Responsible Programming of Our Computers
Software Reflected: The Socially Responsible Programming of Our Computers
In 2480 B.C. a development occurred which was to have a tremendous impact on Mocsian society. A small group of civil engineerine teachers at the most advanced institution worked out a new techniLlue for designing a building. Key elements of this technique were several new structural geometries and the application of a newly developed mathematical...
Multiple View Geometry in Computer Vision
Multiple View Geometry in Computer Vision
"The authors have succeeded very well in describing the main techniques in mainstream multiple view geometry, both classical and modern, in a clear and consistent way....I heartily recommend this book." Computing Reviews

A basic problem in computer vision is to understand the structure of a real world scene. This
...
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
Adversarial Reasoning: Computational Approaches to Reading the Opponent's Mind
The rising tide of threats, from financial cybercrime to asymmetric military conflicts, demands greater sophistication in tools and techniques of law enforcement, commercial and domestic security professionals, and terrorism prevention. Concentrating on computational solutions to determine or anticipate an adversary's intent, Adversarial Reasoning:...
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
Systems Reliability and Failure Prevention (Artech House Technology Management Library)
The primary aim of system reliability is the prevention of failures that affect the operational capability of a system. The probability of such failures can be reduced by the following:

• Conservative design—such as ample margins, use of parts and materials with established operating experience, and observing environmental
...
Wireless Mesh Networks
Wireless Mesh Networks
Wireless mesh networking is a new technology that has the potential to revolutionize how we access the Internet and communicate with co-workers and friends. Wireless Mesh Networks examines the concept and explores its advantages over existing technologies. This book explores existing and future applications, and examines how some of the networking...
Advances in Fuzzy Clustering and its Applications
Advances in Fuzzy Clustering and its Applications

A comprehensive, coherent, and in depth presentation of the state of the art in fuzzy clustering.

Fuzzy clustering is now a mature and vibrant area of research with highly innovative advanced applications. Encapsulating this through presenting a careful selection of research contributions, this book...

Knowledge Management Systems: Value Shop Creation
Knowledge Management Systems: Value Shop Creation
was the value chain developed by Porter (1985). Insights emerged, however, that many organizations have no inbound or outbound logistics of importance, they don’t produce goods in a sequential way and they don’t make money only at the end of their value creation. Therefore, two alternative value configurations have been identified:...
Designing Web Navigation: Optimizing the User Experience
Designing Web Navigation: Optimizing the User Experience
Thoroughly rewritten for today's web environment, this bestselling book offers a fresh look at a fundamental topic of web site development: navigation design. Amid all the changes to the Web in the past decade, and all the hype about Web 2.0 and various "rich" interactive technologies, the basic problems of creating a good web navigation...
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko's SQL Puzzles and Answers, Second Edition (The Morgan Kaufmann Series in Data Management Systems)
Joe Celko has been writing columns for the computer trade press and championing database programming techniques and ANSI/ISO standards via his newsgroup activity for 20 years.

In this complete revision and expansion of his first SQL Puzzles book, he challenges you with his trickiest puzzlesand then helps solve them with a variety of
...
Design for Emergence:  Collaborative Social Play with Online and Location-Based Media, Volume 153 Frontiers in Artificial Intelligence and Applications
Design for Emergence: Collaborative Social Play with Online and Location-Based Media, Volume 153 Frontiers in Artificial Intelligence and Applications
This thesis is an attempt to address the spontaneous, often unpredictable uses of technology that can foster feelings of social participation. A key idea is that social processes and dynamics advance technological design. Consider the most recent applications that are primarily focused on social interaction: social software (Allen, 2004),...
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy