The use of computation and simulation has become an essential part of the scientific process. Being able to transform a theory into an algorithm requires significant theoretical insight, detailed physical and mathematical understanding, and a working level of competency in programming.
This book provides an introduction to concurrent, real-time, distributed programming with Java object-oriented language support as an algorithm description tool. It describes in particular the mechanisms of synchronization (cooperative and competitive) and sharing of data (internal class, static variables) between threads in Java. He...
This second edition of the fully revised and updated From Photon to Pixel presents essential elements in modern digital photographic devices. Our universal infatuation with photography profoundly affects its usage and development.
While some sides of photographic “culture” remain wholly unchanged – art photography,...
Meet the world's top ethical hackers and explore the tools of the trade
Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat...
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies
DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...
Even if the NFC standard is young (developed in 2004), I have
been asked to write this book for several years now, due to the
pioneering role played in France (and in Europe) by our Computer
Science Master’s degree MBDS (www.mbds-fr.org) at the University
of Nice – Sophia-Antipolis around the prototyping of innovative...
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in...
Master Wireshark to solve real-world security problems
If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security...
Network Routing: Fundamentals, Applications and Emerging Technologies serves as single point of reference for both advanced undergraduate and graduate students studying network routing, covering both the fundamental and more moderately advanced concepts of routing in traditional data networks such as the Internet, and emerging routing...
Discover how to maintain and update balanced scorecards and performance dashboards with SQL Server Reporting Services
Complementing the bestselling Balanced Scorecards and Operational Dashboards with Microsoft Excel (9780470386811), this indispensable book shows you how to create maintainable and dynamically updated...
Aspen Plus is on of the most popular process simulation software programs used industrially and academically. Though the software is available at many corporations and universities, there are no textbooks which are dedicated to teaching the step-by-step use of the software. This book is designed to fill that need. The structure of the book is...