This engaging and accessible book presents a set of representative concepts connected by the theme of information security, demonstrating how each allows us to solve real problems. The discussions are
Students studying computer animation and computer games have to be familiar with geometry, matrices, vectors, rotation transforms, quaternions, curves and surfaces, and as computer graphics software b
Hugh Wilkie is an officer of the Colonial Fleet. The only person alive able to meld his mind with the HCSIS computer. A system capable of not just controlling a Dread Naught but mankind s last hope in
EVERYTHING YOU THINK YOU KNOW IS WRONG...That was the strange message left on Cory Maddox's e-mail--just at the moment when years of work on a revolutionary subspace computer system was about to pay o
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in secu
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
Have you harbored questions about what Homeland Security is and how it affects you at the hometown level? This book is directed at the general audience, not necessarily the homeland security professio
Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first compre
Businesses, institutions, families, and individuals rely on security measures to keep themselves and their assets safe. In "The Art and Science of Security, " author Joel Jesus M. Supan provides a pra
This book constitutes the refereed proceedings of the 4th International Conference on Computer Vision/Computer Graphics Collaboration Techniques, MIRAGE 2009, held in Rocquencourt, France, in May 2009
Taking readers to the cutting edge of physics, mathematics, and computer science, Julian Brown tells the dramatic story of the groundbreaking efforts to create a fundamentally new kind of computer tha
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in Sept
The brief provides a quick introduction to the dynamic modelling of power system components. It gives a rigorous derivation of the model of different components of the power system such as synchronous
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the fie
W. D. Wright has identified and provided a provocative discussion of the existence of the Corporate Political Party and a national three-party system, comprised of the CPP and the Republican and Democ
W. D. Wright has identified and provided a provocative discussion of the existence of the Corporate Political Party and a national three-party system, comprised of the CPP and the Republican and Democ
This book constitutes the refereed proceedings of the International Conference on Life System Modeling and Simulation, LSMS 2010, and International Conference on Intelligent Computing for Sustainable
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.The 28 revised full papers,
Does your soul play a part in the choices you make? Astrologer, David R. Railey thinks so. Everyone says they want fulfillment and security, but this book provides clues and insights often obscured by
THE FIRST FINANCIAL GUIDE TAILORED EXCLUSIVELY TO LESBIAN AND GAY COUPLES ON HOW TO PROTECT THEIR ASSETS WHEN LAWS FAILLesbian and gay couples can achieve solid, long-term financial security--but they
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Symposium on Computer Music Modeling and Retrieval, CMMR 2013, held in Marseille, France, in October
Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual real
In many computer vision applications, objects have to be learned and recognized in images or image sequences. This book presents new probabilistic hierarchical models that allow an efficient represent
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in S
In this primer for IT specialists on the aspects of molecular biology and medicine that lend themselves to the application of computer science, budding bioinformaticians will find clear explanations o
Everyone can relate to the hypocrisy or unfair dispensation of justice in our legal system, especially our court system. We often look at the judiciary as the backbone of our legal system assuming it
In this book, internationally recognized experts in philosophy of science, computer science, and modeling and simulation are contributing to the discussion on how ontology, epistemology, and teleology
Requirements Engineering and Management for Software Development Projects presents a complete guide on requirements for software development including engineering, computer science and management acti
MEMS-based Circuits and Systems for Wireless Communications provides comprehensive coverage of RF-MEMS technology from device to system level. This edited volume places emphasis on how system performa
The 1980s and 1990s experienced a proliferation of schools implementing Computer-Based Learning (CBL) and/or Computer-Based Training (CBT) because of today's technological growth. As Technology Educat
Foster care is a system designed to protect children, yet it is a system that often causes additional trauma and pain for the children involved. In Through the Belly of the Beast and Back, author and
Foster care is a system designed to protect children, yet it is a system that often causes additional trauma and pain for the children involved. In Through the Belly of the Beast and Back, author and
The development of physical productive forces is not cyclical, but we have a macroeconomic system that follows boom-and-bust cycles. If the development of physical productive power behaves in a boom-a
The development of physical productive forces is not cyclical, but we have a macroeconomic system that follows boom-and-bust cycles. If the development of physical productive power behaves in a boom-a
Whether users are likely to accept the recommendations provided by a recommender system is of utmost importance to system designers and the marketers who implement them. By conceptualizing the advice
An Essential Guide to American Politics and the American Political System by Kenneth Hill clarifies many of the trends influencing American politics today. You will find in this book a clear analysis
An Essential Guide to American Politics and the American Political System by Kenneth Hill clarifies many of the trends influencing American politics today. You will find in this book a clear analysis
The 2/1 Game Force bidding system is an improvement over the Standard American System that has been in effect and played by bridge players for many years. The advantage of the 2/1 system is that it al