You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This two-volume set LNCS 6691 and 6692 constitutes the refereed proceedings of the 11th International Work-Conference on Artificial Neural Networks, IWANN 2011, held in Torremolinos-Málaga, Spain, in June 2011. The 154 revised papers were carefully reviewed and selected from 202 submissions for presentation in two volumes. The first volume includes 69 papers organized in topical sections on mathematical and theoretical methods in computational intelligence; learning and adaptation; bio-inspired systems and neuro-engineering; hybrid intelligent systems; applications of computational intelligence; new applications of brain-computer interfaces; optimization algorithms in graphic processing units; computing languages with bio-inspired devices and multi-agent systems; computational intelligence in multimedia processing; and biologically plausible spiking neural processing.
Named "Christian" to avoid hassles (some things never change), this is the most famous, the most celebrated astrology book in the English language. It has been prized by students ever since its first publication in 1647. The Horary Astrology in these pages, in the hands of a master, is no mere parlour game. It is demanding and precise, combining science and art. Properly used, it will give answer to any well-defined question. William Lilly, famous throughout England for his almanacs & forecasts (he predicted London's Great Fire of 1666), lived during the English Civil War & was a minor historical figure in it. Into his studio came the rich and poor, nobles and commoners, with problems great ...
This collection of twelve plays, from ancient Greece to twentieth-century America, represents a variety of dramatic forms and styles, including Greek tragedy, seventeenth-century comedy of manners, naturalism, history plays, comedies, dramas and experimental drama.
None
None
None
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed way This practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to oil and gas pipelines, electrical grids, and nuclear refineries. Written in the battle-tested Hacking Exposed style, the book arms you with the skills and tools necessary to defend against attacks that are debilitating—and potentially deadly. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions explains vulnerabilities and attack vectors specific to ICS/SCADA protocols, applications, hardware, s...