You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents the latest research on computer recognition systems. Over the last few years, computer scientists, engineers and users have been confronted with rapid changes in computer interfaces and in the abilities of the machines and the services available. And this is just the beginning: based on recent research findings, we can expect more significant advances and challenges in the next decade. Achievements in the area of artificial intelligence have made an important major contribution to these developments: Machine learning, natural language processing, speech recognition, image and video processing are just some of the major research and engineering directions that have made autonomous driving, language assistants, automatic translation and answering systems as well as other innovative applications such as more human-oriented interfaces possible. Those developments also reflect economic changes in the world, which are increasingly dominated by the needs of enhanced globalization, international cooperation (including its competitive aspects) and emerging global problems.
This book presents the latest research on computer recognition systems. Over the last few years, computer scientists, engineers and users have been confronted with rapid changes in computer interfaces and in the abilities of the machines and the services available. And this is just the beginning: based on recent research findings, we can expect more significant advances and challenges in the next decade. Achievements in the area of artificial intelligence have made an important major contribution to these developments: Machine learning, natural language processing, speech recognition, image and video processing are just some of the major research and engineering directions that have made autonomous driving, language assistants, automatic translation and answering systems as well as other innovative applications such as more human-oriented interfaces possible. Those developments also reflect economic changes in the world, which are increasingly dominated by the needs of enhanced globalization, international cooperation (including its competitive aspects) and emerging global problems.
Artificial Immune Systems (AIS) are adaptive systems inspired by the biological immune system and applied to problem solving. This book provides an accessible introduction that will be suitable for anyone who is beginning to study or work in this area. It gives a clear definition of an AIS, sets out the foundations of the topic (including basic algorithms), and analyses how the immune system relates to other biological systems and processes. No prior knowledge of immunology is needed - all the essential background information is covered in the introductory chapters. Key features of the book include: - A discussion of AIS in the context of Computational Intelligence; - Case studies in Autonom...
Real life problems are known to be messy, dynamic and multi-objective, and involve high levels of uncertainty and constraints. Because traditional problem-solving methods are no longer capable of handling this level of complexity, heuristic search methods have attracted increasing attention in recent years for solving such problems. Inspired by nature, biology, statistical mechanics, physics and neuroscience, heuristics techniques are used to solve many problems where traditional methods have failed. Data Mining: A Heuristic Approach will be a repository for the applications of these techniques in the area of data mining.
Every computer crime leaves tracks–you just have to know where to find them. This book shows you how to collect and analyze the digital evidence left behind in a digital crime scene. Computers have always been susceptible to unwanted intrusions, but as the sophistication of computer technology increases so does the need to anticipate, and safeguard against, a corresponding rise in computer-related criminal activity. Computer forensics, the newest branch of computer security, focuses on the aftermath of a computer security incident. The goal of computer forensics is to conduct a structured investigation to determine exactly what happened, who was responsible, and to perform the investigatio...
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." —Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security—one that is orderly and practical at the same time. He keeps readers grounded and addresses the...
An interactive book-and-DVD package designed to help readers master the tools and techniques of forensic analysis offers a hands-on approach to identifying and solving problems related to computer security issues; introduces the tools, methods, techniques, and applications of computer forensic investigation; and allows readers to test skills by working with real data with the help of five scenarios. Original. (Intermediate)
* Incident response and forensic investigation are the processes of detecting attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks * This much-needed reference covers the methodologies for incident response and computer forensics, Federal Computer Crime law information and evidence requirements, legal issues, and working with law enforcement * Details how to detect, collect, and eradicate breaches in e-mail and malicious code * CD-ROM is packed with useful tools that help capture and protect forensic data; search volumes, drives, and servers for evidence; and rebuild systems quickly after evidence has been obtained
"This book will be riveting reading for security professionals and students, as well as technophiles interested in learning about how computer security fits into the big picture and high-level hackers seeking to broaden their understanding of their craft."--BOOK JACKET.