MASSIVE SAVINGS JUST FOR YOU!
VIEW DEALS

Related Articles

278 products

Advertisement

The felonious activities of confined inmates reach out into society every day. These inmates run lucrative drug operations, commit fraud, hire contract murders, and commit a multitude of criminal offenses from inside
Although fuzzy systems and neural networks are central to the field of soft computing, most research work has focused on the development of the theories, algorithms, and designs of systems for specific
Digital technology now enables unparalleled functionality and flexibility in the capture, processing, exchange, and output of color images. But harnessing its potential requires knowledge of color science, systems, processing algorithms, and device
Recognized as an outstanding guide to traditional methods, the Handbook of Food Spoilage Yeasts, Second Edition upholds the reputation of its predecessor by providing an overview of non-conventional rapid and automated methods
Function transforms are some of the most important math tools for solving problems in all areas of engineering and the physical sciences. The author has compiled the most important and widely used
The traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important new book covers
From cell phones and television remote controls to automobile engines and spacecraft, microcontrollers are everywhere. Programming these prolific devices is a much more involved and integrated task than it is for general-purpose
This extensive library of computer programs-written in C language-allows readers to solve numerical problems in areas of linear algebra, ordinary and partial differential equations, optimization, parameter estimation, and special functions of mathematical
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of
Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs)
At the heart of modern cryptographic algorithms lies computational number theory. Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.