You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.
Includes the decisions and orders of the Board, a table of cases, and a cross reference index from the advance sheet numbers to the volume page numbers.
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss live forensics on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing mali...
This book provides an effective methodology and an essential tool for entrepreneurs, managers and business leaders to nurture innovative behaviour in the workplace by managing its three essential dimensions: people, the business organisation and motivation. The authors go on to explain innovation as an essentially human process that should be managed via three routes: the creative ecosystem, innovative potential and passion, the biological engine that drives us to act. From another angle, we see how we are conditioned by our environment, our skills, our creative blocks and our motivation for innovation.
PID Control for Industrial Processes presents a clear, multidimensional representation of proportional - integral - derivative (PID) control for both students and specialists working in the area of PID control. It mainly focuses on the theory and application of PID control in industrial processes. It incorporates recent developments in PID control technology in industrial practice. Emphasis has been given to finding the best possible approach to develop a simple and optimal solution for industrial users. This book includes several chapters that cover a broad range of topics and priority has been given to subjects that cover real-world examples and case studies. The book is focused on approaches for controller tuning, i.e., method bases on open-loop plant tests and closed-loop experiments.
This is the definitive bibliography of autobiographical writings on Mexico. The book incorporates works by Mexicans and foreigners, with authors ranging from disinherited peasants, women, servants and revolutionaries to more famous painters, writers, singers, journalists and politicians. Primary sources of historic and artistic value, the writings listed provide multiple perspectives on Mexico's past and give clues to a national Mexican identity. This work presents 1,850 entries, including autobiographies, memoirs, collections of letters, diaries, oral autobiographies, interviews, and autobiographical novels and essays. Over 1,500 entries list works from native-born Mexicans written between 1691 and 2003. Entries include basic bibliographical data, genre, author's life dates, narrative dates, available translations into English, and annotation. The bibliography is indexed by author, title and subject, and appendices provide a chronological listing of works and a list of selected outstanding autobiographies.
The present book includes a set of selected extended papers from the sixth International Joint Conference on Computational Intelligence (IJCCI 2014), held in Rome, Italy, from 22 to 24 October 2014. The conference was composed by three co-located conferences: The International Conference on Evolutionary Computation Theory and Applications (ECTA), the International Conference on Fuzzy Computation Theory and Applications (FCTA), and the International Conference on Neural Computation Theory and Applications (NCTA). Recent progresses in scientific developments and applications in these three areas are reported in this book. IJCCI received 210 submissions, from 51 countries, in all continents. Af...