libristo approximation approach to network information theory 9244000

- znaleziono 8 produktów w 2 sklepach

New Trends in Nanotechnology and Fractional Calculus - 2212846389

565,60 zł

New Trends in Nanotechnology and Fractional Calculus Springer Verlag

Dla dzieci

In recent years fractional calculus has played an important role in various fields such as mechanics, electricity, chemistry, biology, economics, modeling, identification, control theory and signal processing. The scope of this book is to present the state of the art in the study of fractional systems and the application of fractional differentiation. Furthermore, the manufacture of nanowires is important for the design of nanosensors and the development of high-yield thin films is vital in procuring clean solar energy. This wide range of applications is of interest to engineers, physicists and mathematicians.Table of contentsPreface;New trends in nanotechnology: Novel Molecular Diodes Developed by Chemial Conjugation of Carbon Nanotubes with Peptide Nucleic Acid, by Krishna V. Singh, Miroslav Penchev, Xiaoye Jing, Alfredo A. Martinez-Morales, Cengiz S. Ozkan and Mihri Ozkan;Hybrid Single Walled Carbon Nanotube FETs for High Fidelity DNA Detection, by Xu Wang, Mihri Ozkan, Gurer Budak, Ziya B. Guvenc and Cengiz S. Ozkan;Towards integrated nanoelectronic and photonic devices, by Alexander Quandt, Maurizio Ferrari and Giancarlo C. Righini;New noninvasive methods for

Sklep: Albertus.pl

Random Networks for Communication - 2867119376

501,77 zł

Random Networks for Communication Cambridge University Press

Książki / Literatura obcojęzyczna

When is a random network (almost) connected? How much information can it carry? How can you find a particular destination within the network? And how do you approach these questions - and others - when the network is random? The analysis of communication networks requires a fascinating synthesis of random graph theory, stochastic geometry and percolation theory to provide models for both structure and information flow. This book is the first comprehensive introduction for graduate students and scientists to techniques and problems in the field of spatial random networks. The selection of material is driven by applications arising in engineering, and the treatment is both readable and mathematically rigorous. Though mainly concerned with information-flow-related questions motivated by wireless data networks, the models developed are also of interest in a broader context, ranging from engineering to social networks, biology, and physics.

Sklep: Libristo.pl

Graph Analysis and Visualization - Discovering Business Opportunity in Linked Data - 2874296546

239,27 zł

Graph Analysis and Visualization - Discovering Business Opportunity in Linked Data John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

Wring more out of the data with a scientific approach to analysis Graph Analysis and Visualization brings graph theory out of the lab and into the real world. Using sophisticated methods and tools that span analysis functions, this guide shows you how to exploit graph and network analytic techniques to enable the discovery of new business insights and opportunities. Published in full color, the book describes the process of creating powerful visualizations using a rich and engaging set of examples from sports, finance, marketing, security, social media, and more. You will find practical guidance toward pattern identification and using various data sources, including Big Data, plus clear instruction on the use of software and programming. The companion website offers data sets, full code examples in Python, and links to all the tools covered in the book. Science has already reaped the benefit of network and graph theory, which has powered breakthroughs in physics, economics, genetics, and more.This book brings those proven techniques into the world of business, finance, strategy, and design, helping extract more information from data and better communicate the results to decision-makers. Study graphical examples of networks using clear and insightful visualizations Analyze specifically-curated, easy-to-use data sets from various industries Learn the software tools and programming languages that extract insights from data Code examples using the popular Python programming language There is a tremendous body of scientific work on network and graph theory, but very little of it directly applies to analyst functions outside of the core sciences - until now. Written for those seeking empirically based, systematic analysis methods and powerful tools that apply outside the lab, Graph Analysis and Visualization is a thorough, authoritative resource.

Sklep: Libristo.pl

Basics of Web Hacking - 2873613811

171,24 zł

Basics of Web Hacking Syngress Media,U.S.

Książki / Literatura obcojęzyczna

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities. The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon.He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user. With Dr. Pauli's approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known - vulnerable Web application VMs that are widely available and maintained for this very purpose. Once you complete the entire process, not only will you be prepared to test for the most damaging Web exploits, you will also be prepared to conduct more advanced Web hacks that mandate a strong base of knowledge. It provides a simple and clean approach to Web hacking, including hands-on examples and exercises that are designed to teach you how to hack the server, hack the Web app, and hack the Web user. It covers the most significant new tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more!It is written by an author who works in the field as a penetration tester and who teaches Web security classes at Dakota State University.

Sklep: Libristo.pl

Online Computation and Competitive Analysis - 2878631226

497,35 zł

Online Computation and Competitive Analysis Cambridge University Press

Książki / Literatura obcojęzyczna

In online computation a computer algorithm must decide how to act on incoming items of information without any knowledge of future inputs. How should it route the next telephone call? Where in memory should it store a just-closed record? This book provides an in-depth presentation of competitive analysis, an attractive framework within which such problems can be analyzed and solved. In this framework, the quality of an algorithm is measured relative to the best possible performance of an algorithm that has complete knowledge of the future. This methodology for the analysis of online decision making has become a standard approach in computer science. Starting with the basic definitions of the competitive analysis model, the authors present most of the essential techniques through various examples, some of which are among the central problems of the field, such as list accessing, paging in a virtual memory system, routing in a communication network, metrical task systems, k-server systems, load balancing, search, and portfolio selection. The book also shows how competitive analysis relates to more classical subjects such as game theory and decision theory. This is an important text and reference for researchers and graduate students in theoretical computer science and in operations research.

Sklep: Libristo.pl

Investigative Psychology - Offender Profiling and the Analysis of Criminal Action - 2826782133

362,18 zł

Investigative Psychology - Offender Profiling and the Analysis of Criminal Action John Wiley & Sons Inc

Książki / Literatura obcojęzyczna

This ground-breaking text is the first to provide a detailed overview of Investigative Psychology, from the earliest work through to recent studies, including descriptions of previously unpublished internal reports. Crucially it provides a framework for students to explore this exciting terrain, combining Narrative Theory and an Action Systems framework. It includes empirically tested models for Offender Profiling and guidance for investigations, as well as an agenda for research in Investigative Psychology. Investigative Psychology features: The full range of crimes from fraud to terrorism, including burglary, serial killing, arson, rape, and organised crime Important methodologies including multi-dimensional scaling and the Radex approach as well as Social Network Analysis Geographical Offender Profiling, supported by detailed analysis of the underlying psychological processes that make this such a valuable investigative decision support tool The full range of investigative activities, including effective information collection, detecting deception and the development of decision support systems.In effect, this text introduces an exciting new paradigm for a wide range of psychological contributions to all forms of investigation within and outside of law enforcement. Each chapter has actual cases and quotations from offenders and ends with questions for discussion and research, making this a valuable text for undergraduate and postgraduate courses in Applied and Forensic Psychology, Criminology, Socio-Legal Studies and related disciplines.

Sklep: Libristo.pl

Technical Commercial and Regulatory Challenges of QoS - 2212842159

251,60 zł

Technical Commercial and Regulatory Challenges of QoS Morgan Kaufmann

Informatyka

This book provides a comprehensive examination of Internet QoS theory, standards, vendor implementation and network deployment from the practitioner's point of view, including extensive discussion of related economic and regulatory issues. Written in a technology-light way so that a variety of professionals and researchers in the information and networking industries can easily grasp the material. This book includes case studies based on real-world experiences from industry. The author starts by discussing the economic, regulatory and technical challenges of the existing QoS model. Key coverage in this book includes defining a clear business model for selling and buying QoS in relation to current and future direction of government regulation and QoS interoperability (or lack thereof) between carriers and networking devices.The author then demonstrates how to improve the current QoS model to create a clear selling point, less regulation uncertainty, and higher chance of deployment success. This includes discussion of QoS re-packaging to end-users; economic and regulatory benefits of the re-packaging; and, the overall benefits of an improved technical approach.Finally, the author discusses the future evolution of QoS from an Internet philosophy perspective and lets the reader draw the conclusions. This book is the first QoS book to provide in depth coverage on the commercial and regulatory aspects of QoS, in addition to the technical aspect. From that, readers can grasp the commercial and regulatory issues of QoS and their implications on the overall QoS business model.This book is also the first QoS book to provide case studies of real world QoS deployments, contributed by the people who did the actual deployments. From that, readers can grasp the practical issues of QoS in real world. This book is also the first QoS book to cover both wireline QoS and wireless QoS. Readers can grasp the QoS issues in the wireless world. The book was reviewed and endorsed by a long list of prominent industrial and academic figures. This is the only book to discuss QoS technology in relation to economic and regulatory issues. It includes case studies based on real-world examples from industry practitioners.It provides unique insight into how to improve the current QoS model to create a clear selling point, less regulatory uncertainty, and higher chance of deployment success.

Sklep: Albertus.pl

DNS Security - 2873617185

291,33 zł

DNS Security Syngress Media,U.S.

Książki / Literatura obcojęzyczna

DNS Security: Hacking and Defending the Domain Name System provides tactics on how to secure a Domain Name System (DNS) framework by exploring common DNS vulnerabilities using real-world examples of DNS exploits and providing step-by-step guidelines for securing the infrastructure. The book is a timely reference as DNS is an integral part of the Internet that translates IP addresses into easily remembered domain names. The book focuses entirely on the security aspects of DNS, combining internal and external data to analyze and effectively prioritize network threats. It shows how to build a security infrastructure based around intelligence, demonstrating how theory can work in real-life situations. Presents a multi-platform approach, covering Linux, BSD, and Windows DNS security tipsDemonstrates how to implement DNS Security tools, including numerous screen shots and configuration examplesProvides a timely reference on DNS, an integral part of the Internet that translates IP addresses into easily remembered domain namesIncludes information of interest to those working in 4DNS, authoritative services, BIND files, buffer overflows, DDoS Attacks, firewalls, transaction signatures, and version control, amongst other topics

Sklep: Libristo.pl

Sklepy zlokalizowane w miastach: Warszawa, Kraków, Łódź, Wrocław, Poznań, Gdańsk, Szczecin, Bydgoszcz, Lublin, Katowice

Szukaj w sklepach lub całym serwisie

1. Sklepy z libristo pl approximation approach to network information theory 9244000

2. Szukaj na wszystkich stronach serwisu

t1=0.026, t2=0, t3=0, t4=0, t=0.026

Dla sprzedawców

copyright © 2005-2024 Sklepy24.pl  |  made by Internet Software House DOTCOM RIVER