Related Articles

26 products in Computers & Internet

Advertisement

Presents the tasks and commands for securing networks with Cisco routers, and for performing a security audit. The author identifies common security risks, and explains how to mitigate those risks, primarily on
Although fuzzy systems and neural networks are central to the field of soft computing, most research work has focused on the development of the theories, algorithms, and designs of systems for specific
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive
This extensive library of computer programs-written in C language-allows readers to solve numerical problems in areas of linear algebra, ordinary and partial differential equations, optimization, parameter estimation, and special functions of mathematical
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs)
Digital Signal Processing Algorithms describes computational number theory and its applications to deriving fast algorithms for digital signal processing. It demonstrates the importance of computational number theory in the design of digital
Microprogrammed State Machine Design is a digital computer architecture text that builds systematically from basic concepts to complex state-machine design. It provides practical techniques and alternatives for designing solutions to data processing
Todays embedded devices and sensor networks are becoming more and more sophisticated, requiring more efficient and highly flexible compilers. Engineers are discovering that many of the compilers in use today are ill-suited
This text presents both the traditional and the modern aspects of AI and soft computing. It provides an in-depth analysis of mathematical models and algorithms and demonstrates their applications in real world
Image algebra is a comprehensive, unifying theory of image transformations, image analysis, and image understanding. In 1996, the bestselling first edition of the Handbook of Computer Vision Algorithms in Image Algebra introduced
With the advent of sophisticated general programming environments like Mathematica, the task of developing new models of metabolism and visualizing their responses has become accessible to students of biochemistry and the life
The Handbook of Applied Expert Systems is a landmark work dedicated solely to this rapidly advancing area of study. Edited by Jay Liebowitz, a professor, author, and consultant known around the world
The first book on the topic for readers with minimal mathematical backgrounds, Wavelet Analysis with Applications to Image Processing provides a thorough introduction to wavelets with applications in image processing. This book
Optimal and Adaptive Signal Processing covers the theory of optimal and adaptive signal processing using examples and computer simulations drawn from a wide range of applications, including speech and audio, communications, reflection
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.