First title to ever present soft computing approaches and their application in data mining, along with the traditional hard-computing approaches Addresses the principles of multime...
Thanks to the Internet, it has never been so easy to become the person of your wildest dreams. Immersive 3D worlds such as Second Life and THERE.com provide an escape route from th...
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with e...
Your expert guide to information security As businesses and consumers become more dependent on complex multinational information systems, the need to understand and devise sound in...
Knowledge of number theory and abstract algebra are pre-requisites for any engineer designing a secure internet-based system. However, most of the books currently available on the...
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at differen...
This concise and practical book shows where code vulnerabilities lie-without delving into the specifics of each system architecture, programming or scripting language, or applicati...
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in...
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the...
The book presents a comprehensive discussion on software quality issues and software quality assurance (SQA) principles and practices, and lays special emphasis on implementing and...