You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Scattering, Natural Surfaces, and Fractals provides a comprehensive overview of electromagnetic scattering from natural surfaces, ranging from the classical to the more recent (fractal) approach. As remote sensing applications become increasingly important, this text provides readers with a solid background in interpretation, classification and thematization of microwave images. The "scattering problem is discussed in detail with emphasis on its application to electromagnetic wave propagation, remote sensing, radar detection, and electromagnetic diagnostics. Natural surface and fractals complete this treatise focusing on how the fractal model represents our natural environment and other plan...
This book analyzes scientific problems within the history of physics, engineering, chemistry, astronomy and medicine, correlated with technological applications in the social context. When and how is tension between disciplines explicitly practised? What is the conceptual bridge between science researches and the organization of technological researches in the development of industrial applications? The authors explain various ways in which the sciences allowed advanced modelling on the one hand, and the development of new technological ideas on the other hand. An emphasis on the role played by mechanisms, production methods and instruments bestows a benefit on historical and scientific disc...
Synthetic Aperture Radar Processing simply and methodically presents principles and techniques of Synthetic Aperture Radar (SAR) image generation by analyzing its system transfer function. The text considers the full array of operation modes from strip to scan, emphasizes processing techniques, enabling the design of operational SAR codes. A simple example then follows. This book will be invaluable to all SAR scientists and engineers working in the field. It may be used as the basis for a course on SAR image generation or as a reference book on remote sensing. It contains a wide spectrum of information presented with clarity and rigor.
Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to de
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks—using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton’s decades of experience with computer security, including penetration testing of military networks, the White House, ut...
The discrete Volterra series holds particular value in the analysis of nonlinear systems in telecommunications. However, most books on the Volterra series either do not address this application or only offer a partial discussion. Nonlinear Aspects of Telecommunications provides an in-depth treatment of the Volterra series and the benefits it offers as a representation of nonlinear problems, particularly in echo cancellation in digital telecommunications systems. Beginning with the fundamentals of the discrete Volterra series, the author presents its basic definition, notions, conditions for convergence and stability, and its matrix representation for multiple-input and multiple-output nonlin...
This book constitutes the refereed proceedings of the 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, held in Naples, Italy, in September 2011. The 34 full papers presented together were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on RAM evaluation, complex systems dependability, formal verification, risk and hazard analysis, cybersecurity and optimization methods.
This book examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance through the design of distributed and resilient applications, it provides an overview of the various standards that service oriented and distributed applications leverage to provide the understanding required to make intelligent decisions regarding their design. The book reviews recent research on access control for simple and conversation-based web services, advanced digital identity management techniques, and access control for web-based workflows.
Provides the state of the art of modelling, simulation and calculation methods for electromagnetic fields and waves and their application.