• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

V. S. Subrahmanian - książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2952079]
• Literatura piękna
 [1850969]

  więcej...
• Turystyka
 [71058]
• Informatyka
 [151066]
• Komiksy
 [35579]
• Encyklopedie
 [23181]
• Dziecięca
 [620496]
• Hobby
 [139036]
• AudioBooki
 [1646]
• Literatura faktu
 [228729]
• Muzyka CD
 [379]
• Słowniki
 [2932]
• Inne
 [445708]
• Kalendarze
 [1409]
• Podręczniki
 [164793]
• Poradniki
 [480107]
• Religia
 [510956]
• Czasopisma
 [511]
• Sport
 [61267]
• Sztuka
 [243299]
• CD, DVD, Video
 [3411]
• Technologie
 [219640]
• Zdrowie
 [100984]
• Książkowe Klimaty
 [124]
• Zabawki
 [2281]
• Puzzle, gry
 [3363]
• Literatura w języku ukraińskim
 [258]
• Art. papiernicze i szkolne
 [8020]
Kategorie szczegółowe BISAC
 Multimedia Information Systems V. S. Subrahmanian Satish K. Tripathi 9781441950420 Not Avail
Multimedia Information Systems

V. S. Subrahmanian Satish K. Tripathi
Multimedia Information Systems brings together in one place important contributions and up-to-date research results in this fast moving area.
Multimedia Information Systems serves as an excellent reference, providing insight into some of the most challenging research issues in the field.
Multimedia Information Systems brings together in one place important contributions and up-to-date research results in this fast moving area....
cena: 402,53
 Handbook of Computational Approaches to Counterterrorism V. S. Subrahmanian 9781461453109 Springer
Handbook of Computational Approaches to Counterterrorism

V. S. Subrahmanian

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during the past decade have led to significant new ways of studying terrorist groups, making forecasts, learning models of their behaviour, and shaping policies about their behaviour.

Handbook of Computational Approaches to Counterterrorism provides the first in-depth look at how advanced mathematics and modern computing technology is shaping the study of terrorist groups. This book includes contributions from world experts in the field,...

Terrorist groups throughout the world have been studied primarily through the use of social science methods. However, major advances in IT during t...

cena: 402,53
 Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781461454151 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

Jajodia, Sushil

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 402,53
 Multimedia Database Systems: Issues and Research Directions Subrahmanian, V. S. 9783642646225 Springer
Multimedia Database Systems: Issues and Research Directions

Subrahmanian, V. S.
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia data, the problem of how to store and retrieve such data is becoming increasingly important. Thus, although the field of multimedia database systems is only about 5 years old, it is rapidly becoming a focus for much excitement and research effort. Multimedia database systems are intended to provide unified frameworks for requesting and integrating information in a wide variety of formats, such as audio and video data, document data, and image data. Such data often have special storage...
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia data, the problem of how to store and retrieve such ...
cena: 402,53
 A General Framework for Reasoning on Inconsistency Martinez, Maria Vanina 9781461467496 Springer
A General Framework for Reasoning on Inconsistency

Martinez, Maria Vanina
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution methods that have not yet been studied. The proposed framework allows users to specify preferences on how to resolve inconsistency when there are multiple ways to do so. This empowers users to resolve inconsistency in data leveraging both their detailed knowledge of the data as well as their application needs. The brief shows that the framework is well-suited to handle inconsistency in several logics, and provides algorithms to compute preferred...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide variety of logics, including inconsistency resolution meth...
cena: 160,99
 Indian Mujahideen: Computational Analysis and Public Policy Subrahmanian, V. S. 9783319028170 Springer
Indian Mujahideen: Computational Analysis and Public Policy

Subrahmanian, V. S.

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy "This book presents a highly innovative computational approach to analyzing the strategic behavior of terrorist groups and formulating counter-terrorism policies. It would be very useful for international security analysts and policymakers." Uzi Arad, National Security Advisor to the Prime Minister of Israel and Head, Israel National Security Council (2009-2011) "An important book on a complex security problem. Issues have been analysed in depth based on quality research. Insightful and well-balanced in...

Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy "This book presents a highly innovative computational approach to an...

cena: 402,53
 The Global Cyber-Vulnerability Report V. S. Subrahmanian Michael Ovelgonne Tudor Dumitras 9783319257587 Springer
The Global Cyber-Vulnerability Report

V. S. Subrahmanian Michael Ovelgonne Tudor Dumitras

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored.

Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens...

This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year ...

cena: 402,53
 Moving Target Defense II: Application of Game Theory and Adversarial Modeling Jajodia, Sushil 9781489993168 Springer
Moving Target Defense II: Application of Game Theory and Adversarial Modeling

Jajodia, Sushil

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their attacks carefully over time and launch attacks at cyber speeds at any given moment. We need a new class of defensive strategies that would force adversaries to continually engage in reconnaissance and re-planning of their cyber operations. One such strategy is to present adversaries with a moving target where the attack surface of a system keeps changing.

Moving Target Defense II: Application of Game Theory and Adversarial Modeling...

Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and security patch deployment. Adversaries could plan their ...

cena: 402,53
 Cyber Warfare: Building the Scientific Foundation Jajodia, Sushil 9783319140384 Springer
Cyber Warfare: Building the Scientific Foundation

Jajodia, Sushil
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially...
This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is ...
cena: 523,30
 Computational Analysis of Terrorist Groups: Lashkar-E-Taiba Subrahmanian, V. S. 9781489992635 Springer
Computational Analysis of Terrorist Groups: Lashkar-E-Taiba

Subrahmanian, V. S.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and modern computing technology can influence the insights we have on terrorist groups. This book primarily focuses on one famous terrorist group known as Lashkar-e-Taiba (or LeT), and how it operates. After 10 years of counter Al Qaeda operations, LeT is considered by many in the counter-terrorism community to be an even greater threat to the US and world peace than Al Qaeda.

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba...

Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web intelligence, and how advanced mathematics and ...

cena: 342,14
ilość książek w kategorii: 19
 1  2  Następna Ostatnia


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2026 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia