Related Articles

Search Results

Advertisement

Presents the tasks and commands for securing networks with Cisco routers, and for performing a security audit. The author identifies common security risks, and explains how to mitigate those risks, primarily on
This extensive library of computer programs-written in C language-allows readers to solve numerical problems in areas of linear algebra, ordinary and partial differential equations, optimization, parameter estimation, and special functions of mathematical
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy. Multimedia Security Handbook addresses multiple issues related to the protection of
With the advent of sophisticated general programming environments like Mathematica, the task of developing new models of metabolism and visualizing their responses has become accessible to students of biochemistry and the life
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.