|
|
|
|
| | Shellcoder's Programming UncoveredSome software isn't effective because it proves unable to prevent the propagation of worms, but this guide examines where security holes come from, how to discover them, how to protect systems, and how to do away with security holes altogether.
How hackers, viruses, and worms attack computers from the Internet and exploit security holes... | | An Introduction to Distributed Algorithms"Barbosa makes the otherwise difficult subject of distributed algorithms very enjoyable and attractive to both students and researchers. The leading intuitive discussion of each algorithm is so very well organized and clearly written that a reader can, without the slightest effort, have a clear picture of it. An ideal textbook for an... |
|
|
An Introduction to Neural NetworksCovers: artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods, including back-propagation; associative memory and Hopfield nets; and self-organization and feature maps.
This book grew out of a set of course notes for a neural networks module given as part of a... | | | | Semiotics and Intelligent Systems DevelopmentThis book assembles semiotics and artificial intelligence techniques in order to design new kinds of intelligence systems; it changes the research field of artificial intelligence by incorporating the study of meaning processes (semiosis), from the perspective of formal sciences, linguistics, and philosophy.
Sometimes, in order to... |
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 |