Statistical Modeling and Analysis for Complex Data Problems
ISBN: 9780387245546 / Angielski / Twarda / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Statistical Modeling and Analysis for Complex Data Problems treats some of today s more complex problems and it reflects some of the important research directions in the field. Twenty-nine authors largely from Montreal s GERAD Multi-University Research Center and who work in areas of theoretical statistics, applied statistics, probability theory, and stochastic processes present survey chapters on various theoretical and applied problems of importance and interest to researchers and students across a number of academic domains. "Statistical Modeling and Analysis for Complex Data Problems treats some of today s more complex problems and it reflects some of t... |
|
cena:
383,73 zł |
Home-Oriented Informatics and Telematics: Proceedings of the Ifip Wg 9.3 Hoit2005 Conference
ISBN: 9780387251783 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Home-Oriented Informatics and Telematics is an essential reference for both academic and professional researchers in the field of home informatics. The home is a key aspect of society and the widespread use of computers and other information appliances is transforming the way in which we live, work and communicate in the information age. This area of study has seen remarkable growth in the last few years as information technology has encroached into every corner of home and social spheres. The papers selected here cover a growing range of topics, including... Home-Oriented Informatics and Telematics is an essential reference for both academic and professional researchers in the field of ... |
|
cena:
383,73 zł |
A Classical Introduction to Cryptography: Applications for Communications Security
ISBN: 9780387254647 / Angielski / Twarda / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes. This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature... A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication securit... |
|
cena:
422,11 zł |
Human Factors and Voice Interactive Systems
ISBN: 9780387254821 / Angielski / Twarda / 469 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The second edition of Human Factors and Voice Interactive Systems, in addition to updating chapters from the first edition, adds in-depth information on current topics of major interest to speech application developers. These topics include use of speech technologies in automobiles, speech in mobile phones, natural language dialogue issues in speech application design, and the human factors design, testing, and evaluation of interactive voice response (IVR) applications.
The second edition of Human Factors and Voice Interactive Systems, in addition to updating chapters from the first edition, adds in-depth informati... |
|
cena:
575,62 zł |
Data Warehousing and Data Mining Techniques for Cyber Security
ISBN: 9780387264097 / Angielski / Twarda / 159 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The ever expanding, tremendous amount of data collected and stored in large databases has far exceeded our human ability to comprehend--without the proper tools. There is a critical need for data analysis that can automatically analyze data, summarize it and predict future trends. In the modern age of Internet connectivity, concerns about denial of service attacks, computer viruses and worms are extremely important. Data Warehousing and Data... Data warehousing and data mining provide techniques for collecting information from distributed databases and for performing data analysis. The eve... |
|
cena:
383,73 zł |
Secure Public Key Infrastructure: Standards, PGP and Beyond
ISBN: 9780387271590 / Angielski / Twarda / 125 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CAs). The CAs issue certificates that establish ownership of public keys, which can be used to support authentication, integrity and privacy. The structure of a PKI can be quite complex, and securing PKIs has therefore become a major concern, exacerbated with the commercialization of the Internet. Secure Public Key Infrastructure: Standards, PGP and Beyond focuses on security aspects of public key infrastructures,... Public Key Infrastructures (PKI) are a trust management technology for public keys, consisting of several interconnected Certifying Authorities (CA... |
|
cena:
370,51 zł |
Understanding Intrusion Detection Through Visualization
ISBN: 9780387276342 / Angielski / Twarda / 145 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Goteborg, Sweden. The dissertation, in turn collects a number of research efforts performed over a period of six years or so into a coherent whole. It was my honor to serve as the "opponent" at Dr. Axelsson's examination. In the Swedish system, it is the job of the opponent to place the candidate's work into a broader perspective, demonstrating its significance and contributions to the field and then to introduce the work to the attendees at the examination. This done, the candidate presents the...
This monograph is the outgrowth of Stefan Axelson's PhD Dissertation at Chalmers University in Goteborg, Sweden. The dissertation, in turn collects a ...
|
|
cena:
383,73 zł |
A Classical Introduction to Cryptography Exercise Book
ISBN: 9780387279343 / Angielski / Twarda / 254 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerland Serge Vaudenay EPFL, Switzerland Springer - Thomas Baignbres Pascal Junod EPFL - I&C - LASEC Lausanne, Switzerland Lausanne, Switzerland Yi Lu Jean Monnerat EPFL - I&C - LASEC EPFL-I&C-LASEC Lausanne, Switzerland Lausanne, Switzerland Serge Vaudenay Lausanne, Switzerland Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY...
TO CRYPTOGRAPHY EXERCISE BOOK Thomas Baignkres EPFL, Switzerland Pascal Junod EPFL, Switzerland Yi Lu EPFL, Switzerland Jean Monnerat EPFL, Switzerlan...
|
|
cena:
164,99 zł |
Genetic Programming Theory and Practice III
ISBN: 9780387281100 / Angielski / Twarda / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and practice by exploring the emerging interaction between theory and practice in the cutting-edge, machine learning method of Genetic Programming (GP). The contributions developed from a third workshop at the University of Michigan's Center for the Study of Complex Systems, where leading international genetic programming theorists from major universities and active practitioners from leading industries and businesses meet to examine and challenge... Genetic Programming Theory and Practice III provides both researchers and industry professionals with the most recent developments in GP theory and... |
|
cena:
575,62 zł |
Methods and Procedures for the Verification and Validation of Artificial Neural Networks
ISBN: 9780387282886 / Angielski / Twarda / 278 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating characteristics of biological thinking and learning. Currently no standards exist to verify and validate neural network-based systems. NASA Independent Verification and Validation Facility has contracted the Institute for Scientific Research, Inc. to perform research on this topic and develop a comprehensive guide to performing V&V on adaptive systems, with emphasis on neural networks used in safety-critical or mission-critical applications. ...Neural networks are members of a class of software that have the potential to enable intelligent computational systems capable of simulating charac... |
|
cena:
383,73 zł |
Cryptographics: Exploiting Graphics Cards for Security
ISBN: 9780387290157 / Angielski / Twarda / 140 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and removing it. This is especially so for video conferencing, thin-client computing and Internet cafes. CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within GPUs, and describes the relevance of GPU-based encryption to the security of applications involving remote displays. As the processing power of GPUs increases, research involving the use of GPUs... Software that covertly monitors user actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficult... |
|
cena:
383,73 zł |
Quality of Protection: Security Measurements and Metrics
ISBN: 9780387290164 / Angielski / Twarda / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano, Italy (September 2005). This volume discusses how security research can progress towards quality of protection in security comparable to quality of service in networking and software measurements, and metrics in empirical software engineering. Information security in the business setting has matured in the last few decades. Standards such as IS017799, the Common Criteria (ISO15408), and a number of industry certifications and risk analysis... Quality of Protection: Security Measurements and Metrics is an edited volume based on the Quality of Protection Workshop in Milano... |
|
cena:
767,51 zł |
Computer Viruses and Malware
ISBN: 9780387302362 / Angielski / Twarda / 228 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger concern. Computer Viruses and Malware draws together hundreds of sources to provide an unprecedented view of malicious software and its countermeasures. This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It also looks at the application of malicious software to computer crime and information warfare. Computer Viruses and Malware... Our Internet-connected society increasingly relies on computers. As a result, attacks on computers from malicious software have never been a bigger... |
|
cena:
498,87 zł |
Eunice 2005: Networks and Applications Towards a Ubiquitously Connected World: Ifip International Workshop on Networked Applications, Colmenarejo, Mad
ISBN: 9780387308159 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) EUNICE is a network of Universities throughout Europe. The EUNICE network has been created to foster the mobility of students, faculty nembers and research scientists working in the field of information and com llunication technologies and to promote educational and research cooperation between its member institutions. The prime means for implementing these goals is the annual Summer School organized by the member institutions. From its conception, the EUNICE Summer Schools were designed as unique events where the joint participation of PhD students and supervisors working in the field of...
EUNICE is a network of Universities throughout Europe. The EUNICE network has been created to foster the mobility of students, faculty nembers and res...
|
|
cena:
383,73 zł |
Power Analysis Attacks: Revealing the Secrets of Smart Cards
ISBN: 9780387308579 / Angielski / Twarda / 338 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mobile communications, pay TV, and electronic signatures. In all these applications, the security of the smart cards is of crucial importance. Power Analysis Attacks: Revealing the Secrets of Smart Cards is the first comprehensive treatment of power analysis attacks and countermeasures. Based on the principle that the only way to defend against power analysis attacks is to understand them, this book explains how... Power analysis attacks allow the extraction of secret information from smart cards. Smart cards are used in many applications including banking, mo... |
|
cena:
690,75 zł |
Adaptive Learning of Polynomial Networks: Genetic Programming, Backpropagation and Bayesian Methods
ISBN: 9780387312392 / Angielski / Twarda / 336 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book provides theoretical and practical knowledge for develop- ment of algorithms that infer linear and nonlinear models. It offers a methodology for inductive learning of polynomial neural network mod- els from data. The design of such tools contributes to better statistical data modelling when addressing tasks from various areas like system identification, chaotic time-series prediction, financial forecasting and data mining. The main claim is that the model identification process involves several equally important steps: finding the model structure, estimating the model weight...
This book provides theoretical and practical knowledge for develop- ment of algorithms that infer linear and nonlinear models. It offers a methodology...
|
|
cena:
575,62 zł |
Malware Detection
ISBN: 9780387327204 / Angielski / Twarda / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medical, power, telecommunications, and finance are highly dependent on information systems. These two factors have exposed our critical infrastructures to malicious attacks and accidental failures. Many malicious attacks are achieved by malicious code or malware, such as viruses and worms. Given the deleterious affects of malware on our cyber infrastructure, identifying malicious programs is an important goal. Unfortunately, malware detectors have... Shared resources, such as the Internet, have created a highly interconnected cyber-infrastructure. Critical infrastructures in domains such as medi... |
|
cena:
1151,28 zł |
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks
ISBN: 9780387327211 / Angielski / Twarda / 394 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor networks. It is suitable as a text for computer science courses in wireless systems and security. It includes implementation studies with mica2 mote sensors. Due to the open spectrum nature of wireless communication, it is subject to attacks and intrusions. Hence the wireless network synchronization needs to be both robust and secure. Furthermore, issues such as energy constraints and mobility make the localization process even more challenging. The... This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc networks and wireless sensor netw... |
|
cena:
767,51 zł |
Software Verification and Validation: An Engineering and Scientific Approach
ISBN: 9780387327259 / Angielski / Twarda / 172 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) The World is lacking an in-depth technical book describing the meth ods and techniques used to provide confidence in our system software. Not only is the U.S. government more focused on software safety in to day's market, but private industry and academia are as well. The methods and techniques that provide such confidence are commonly called software verification and validation. Software Verification and Validation: An Engineering and Scientific Approach, a professional book, fills the critical need for an in-depth tech nical reference providing the methods and techniques for building and...
The World is lacking an in-depth technical book describing the meth ods and techniques used to provide confidence in our system software. Not only is ...
|
|
cena:
460,49 zł |
System Modeling and Optimization: Proceedings of the 22nd Ifip Tc7 Conference Held From, July 18-22, 2005, Turin, Italy
ISBN: 9780387327747 / Angielski / Twarda / 300 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych (dostawa przed świętami) We publish in this volume the plenary talks and a selection of the papers on numerics, optimization and their applications, presented at the 22nd Conference on System Modeling and Optimization, held at the Politecnico di Torino in July 2005. The conference has been organized by the Mathematical Department of the Politecnico di Torino. IFIP is a multinational federation of professional and technical organi- tions concerned with information processes. It was established in 1959 under the auspices of UNESCO. IFIP still mantains friendly connections with s- cialized agencies of the UN systems. It...
We publish in this volume the plenary talks and a selection of the papers on numerics, optimization and their applications, presented at the 22nd Conf...
|
|
cena:
383,73 zł |