Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

A Bridge between Conceptual Frameworks
  • Language: en
  • Pages: 621

A Bridge between Conceptual Frameworks

  • Type: Book
  • -
  • Published: 2015-06-30
  • -
  • Publisher: Springer

This book analyzes scientific problems within the history of physics, engineering, chemistry, astronomy and medicine, correlated with technological applications in the social context. When and how is tension between disciplines explicitly practised? What is the conceptual bridge between science researches and the organization of technological researches in the development of industrial applications? The authors explain various ways in which the sciences allowed advanced modelling on the one hand, and the development of new technological ideas on the other hand. An emphasis on the role played by mechanisms, production methods and instruments bestows a benefit on historical and scientific disc...

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks
  • Language: en
  • Pages: 338

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

  • Type: Book
  • -
  • Published: 2016-04-19
  • -
  • Publisher: CRC Press

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de

Conducting Network Penetration and Espionage in a Global Environment
  • Language: en
  • Pages: 603

Conducting Network Penetration and Espionage in a Global Environment

  • Type: Book
  • -
  • Published: 2014-04-28
  • -
  • Publisher: CRC Press

When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks—using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton’s decades of experience with computer security, including penetration testing of military networks, the White House, ut...

Nonlinear Aspects of Telecommunications
  • Language: en
  • Pages: 292

Nonlinear Aspects of Telecommunications

  • Type: Book
  • -
  • Published: 2018-10-08
  • -
  • Publisher: CRC Press

The discrete Volterra series holds particular value in the analysis of nonlinear systems in telecommunications. However, most books on the Volterra series either do not address this application or only offer a partial discussion. Nonlinear Aspects of Telecommunications provides an in-depth treatment of the Volterra series and the benefits it offers as a representation of nonlinear problems, particularly in echo cancellation in digital telecommunications systems. Beginning with the fundamentals of the discrete Volterra series, the author presents its basic definition, notions, conditions for convergence and stability, and its matrix representation for multiple-input and multiple-output nonlin...

Computer Safety, Reliability, and Security
  • Language: en
  • Pages: 494

Computer Safety, Reliability, and Security

  • Type: Book
  • -
  • Published: 2011-09-15
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimization methods.

Security for Service Oriented Architectures
  • Language: en
  • Pages: 200

Security for Service Oriented Architectures

  • Type: Book
  • -
  • Published: 2014-04-24
  • -
  • Publisher: CRC Press

This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the design of distributed and resilient applications, it provides an overview of the various standards that service oriented and distributed applications leverage to provide the understanding required to make intelligent decisions regarding their design. The book reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.

Electromagnetics in a Complex World
  • Language: en
  • Pages: 327

Electromagnetics in a Complex World

Provides the state of the art of modelling, simulation and calculation methods for electromagnetic fields and waves and their application.

Remote Sensing of Impervious Surfaces
  • Language: en
  • Pages: 496

Remote Sensing of Impervious Surfaces

  • Type: Book
  • -
  • Published: 2007-10-03
  • -
  • Publisher: CRC Press

Remote sensing of impervious surfaces has matured using advances in geospatial technology so recent that its applications have received only sporadic coverage in remote sensing literature. Remote Sensing of Impervious Surfaces is the first to focus entirely on this developing field. It provides detailed coverage of mapping, data extraction,

SSL and TLS: Theory and Practice, Second Edition
  • Language: en
  • Pages: 301

SSL and TLS: Theory and Practice, Second Edition

  • Type: Book
  • -
  • Published: 2016-03-31
  • -
  • Publisher: Artech House

This completely revised and expanded second edition of SSL and TLS: Theory and Practice provides an overview and a comprehensive discussion of the Secure Sockets Layer (SSL), Transport Layer Security (TLS), and Datagram TLS (DTLS) protocols that are omnipresent in today's e-commerce and e-business applications and respective security solutions. It provides complete details on the theory and practice of the protocols, offering readers a solid understanding of their design principles and modes of operation. Updates to this edition include coverage of the recent attacks against the protocols, newly specified extensions and firewall traversal, as well as recent developments related to public key...

Advanced Technology Related to Radar Signal, Imaging, and Radar Cross-Section Measurement
  • Language: en
  • Pages: 570

Advanced Technology Related to Radar Signal, Imaging, and Radar Cross-Section Measurement

  • Type: Book
  • -
  • Published: 2020-06-16
  • -
  • Publisher: MDPI

Radar-related technology is mainly processed within the time and frequency domains but, at the same time, is a multi-dimensional integrated system including a spatial domain for transmitting and receiving electromagnetic waves. As a result of the enormous technological advancements of the pioneers actively discussed in this book, research and development in multi-dimensional undeveloped areas is expected to continue. This book contains state-of-the-art work that should guide your research.