|
|
Social Network-Based Recommender Systems
This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters... | | Quantum Walks and Search Algorithms (Quantum Science and Technology)
This book addresses an interesting area of quantum computation called quantum walks, which play an important role in building quantum algorithms, in particular search algorithms. Quantum walks are the quantum analogue of classical random walks.
It is known that quantum computers have great power for searching unsorted databases.... | | Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |
|
| | | | Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |
|
| | | | Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing... |
|
|
Result Page: 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 |