The world of hacking is a world of pain and frustration. Frustration for the hacker as
he tries to figure out how to break the latest and greatest security device, and pain for
the manufacturer or corporation that made or was relying on that device.
Dissecting the Hack is one heck of a ride! Hackers, IT professional, and...
The purpose of this book is to provide up-to-date progress both in Multiple Criteria
Programming (MCP) and Support Vector Machines (SVMs) that have become powerful
tools in the field of data mining. Most of the content in this book are directly
from the research and application activities that our research group has conducted
over the...
Where do program ideas come from? How are concepts developed into saleable productions? Who do you talk to about getting a show produced? How do you schedule shows on the lineup? What do you do if a series is in trouble? The answers to these questions, and many more, can be found in this comprehensive, in-depth look at the roles and...
This book is all about wrangling a herd of network computers so that all
display the correct time. This may seem like a really narrow business,
but the issues go far beyond winding the clock on your display taskbar.
Carefully coordinated, reliable, and accurate time is vital for traffic control
in the air and on the ground, buying and...
The first author, Said Elnashaie, and his wife, Shadia Elshishini, moved next door to
the second author, Frank Uhlig, and his family in 2000. The two families became good
neighbors and friends. Their chats covered the usual topics and occasionally included
random teaching, departmental, and...
Privacy is a basic human need, and losing privacy is perceived as an extremely
threatening experience. Privacy embraces solitude, personal space, or intimacy with
family and friends and as such, it is a ubiquitous and trans-cultural phenomenon.
Privacy leverages well-being; without privacy we are at risk of becoming physically
or...
The standard second course in computer science has traditionally covered the fun-
damental data structures and algorithms, but more recently these topics have been
included in the broader topic of abstract data types. This book is no exception,
with the main focus on the design, use, and implementation of abstract data types.
The...
This book is based in part on my earlier work. Pattern Recognition: Applications to Large Data-Set Problems, published by Marcel Dekker: Inc. in 1984. It was originally intended that this volume be a second editon of that work. However, due to the tremendous
amount of material added it seemed that a new title. Pattern Recognition...
This book is complete: my checklists and FileMaker databases have cross-indexed features, preferences, and the applications that ship with Mac OS X, to make certain that everything shows up somewhere in the book. It has been revised against the second update—Mac OS X 10.0.2. We have tried to include screen shots of almost every feature,...
The rapid growth of the Web in the past two decades has made it the largest
publicly accessible data source in the world. Web mining aims to discover
useful information or knowledge from Web hyperlinks, page contents,
and usage logs. Based on the primary kinds of data used in the
mining process, Web mining tasks can be categorized...
I FIRST STARTED PLAYING WITH THE ANDROID SDK before it was offi cially released as a 1.0 release.
Back then, the tools were unpolished, the APIs in the SDK were unstable, and the documentation
was sparse. Fast forward two and a half years, Android is now a formidable mobile operating
system, with a following no less impressive that the...
Wiley-Interscience Series in Discrete Mathematics and Optimization Advisory Editors Ronald L. Graham Jan Karel Lenstra Robert E. Tarjan Discrete Mathematics and Optimization involves the study of finite structures. It is one of the fastest growing areas in mathematics today. The level and depth of recent advances in the area and the wide...