Skip to main content

Books in Physical sciences and engineering

    • Flashback Mechanisms in Lean Premixed Gas Turbine Combustion

      • 1st Edition
      • December 8, 2014
      • Ali Cemal Benim + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 5 5 6
      Blending fuels with hydrogen offers the potential to reduce NOx and CO2 emissions in gas turbines, but doing so introduces potential new problems such as flashback. Flashback can lead to thermal overload and destruction of hardware in the turbine engine, with potentially expensive consequences. The little research on flashback that is available is fragmented. Flashback Mechanisms in Lean Premixed Gas Turbine Combustion by Ali Cemal Benim will address not only the overall issue of the flashback phenomenon, but also the issue of fragmented and incomplete research.
    • Advances in Artificial Transportation Systems and Simulation

      • 1st Edition
      • December 8, 2014
      • Rosaldo J F Rossetti + 1 more
      • English
      • Hardback
        9 7 8 0 1 2 3 9 7 0 4 1 1
      • eBook
        9 7 8 0 1 2 3 9 7 3 2 8 3
      The Intelligent Systems Series encompasses theoretical studies, design methods, and real-world implementations and applications. It publishes titles in three core sub-topic areas: Intelligent Automation, Intelligent Transportation Systems, and Intelligent Computing. Titles focus on professional and academic reference works and handbooks. This volume, Advances in Artificial Transportation Systems and Simulation, covers hot topics including driver assistance systems; cooperative vehicle-highway systems; collision avoidance; pedestrian protection; image, radar and lidar signal processing; and V2V and V2I communications. The readership for the series is broad, reflecting the wide range of intelligent systems interest and application, but focuses on engineering (in particular automation, control, mechatronics, robotics, transportation, automotive, aerospace), electronics and electronic design, and computer science.
    • The Complete Business Process Handbook

      • 1st Edition
      • December 6, 2014
      • Mark Von Rosing + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 7 9 9 9 5 9 3
      • eBook
        9 7 8 0 1 2 8 0 0 4 7 2 2
      The Complete Business Process Handbook is the most comprehensive body of knowledge on business processes with revealing new research. Written as a practical guide for Executives, Practitioners, Managers and Students by the authorities that have shaped the way we think and work with process today. It stands out as a masterpiece, being part of the BPM bachelor and master degree curriculum at universities around the world, with revealing academic research and insight from the leaders in the market. This book provides everything you need to know about the processes and frameworks, methods, and approaches to implement BPM. Through real-world examples, best practices, LEADing practices and advice from experts, readers will understand how BPM works and how to best use it to their advantage. Cases from industry leaders and innovators show how early adopters of LEADing Practices improved their businesses by using BPM technology and methodology. As the first of three volumes, this book represents the most comprehensive body of knowledge published on business process. Following closely behind, the second volume uniquely bridges theory with how BPM is applied today with the most extensive information on extended BPM. The third volume will explore award winning real-life examples of leading business process practices and how it can be replaced to your advantage.
    • Service Computing: Concept, Method and Technology

      • 1st Edition
      • December 6, 2014
      • Zhaohui Wu
      • English
      • Hardback
        9 7 8 0 1 2 8 0 2 3 3 0 3
      • eBook
        9 7 8 0 1 2 8 0 2 5 9 7 0
      Service computing is a cross-disciplinary field that covers science and technology, and represents a promising direction for distributed computing and software development methodologies. It aims to bridge the gap between business services and IT services by supporting the whole lifecycle of services innovation. Over the last ten years applications in industry and academic research have produced considerable progress and success Service Computing: Concept, Method and Technology presents the concept of service computing and a proposed reference architecture for service computing research before proceeding to introduce two underlying technologies: Web services and service-oriented architecture. It also presents the authors’ latest research findings on hot topics such as service discovery, recommendation, composition, verification, service trust, dynamic configuration and big data service. Some new models and methods are proposed including three service discovery methods based on semantics and skyline technologies, two service recommendation methods using graph mining and QoS prediction, two service composition methods with graph planning and one service verification method using π calculus and so on. Moreover, this book introduces JTang, an underlying platform supporting service computing, which is a product of the authors’ last ten years of research and development.
    • Household Service Robotics

      • 1st Edition
      • December 5, 2014
      • Yangsheng Xu + 2 more
      • English
      • Hardback
        9 7 8 0 1 2 8 0 0 8 8 1 2
      • eBook
        9 7 8 0 1 2 8 0 0 9 4 3 7
      Copyright ©2015 Zhejiang University Press, Published by Elsevier Inc. Household Service Robotics is a collection of the latest technological advances in household service robotics in five main areas: robot systems, manipulation, navigation, object recognition, and human-robot interaction. The book enables readers to understand development s and apply them to their own working areas, including: Robotic technologies for assisted living and elderly care Domestic cleaning automation Household surveillance Guiding systems for public spaces Service robotics is a highly multidisciplinary field, requiring a holistic approach. This handbook provides insights to the disciplines involved in the field as well as advanced methods and techniques that enable the scale-up of theory to actual systems. It includes coverage of functionalities such as vision systems, location control, and HCI, which are important in domestic settings.
    • A Machine-Learning Approach to Phishing Detection and Defense

      • 1st Edition
      • December 5, 2014
      • O.A. Akanbi + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 9 2 7 5
      • eBook
        9 7 8 0 1 2 8 0 2 9 4 6 6
      Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A Machine-Learning Approach to Phishing Detetion and Defense have conducted research to demonstrate how a machine learning algorithm can be used as an effective and efficient tool in detecting phishing websites and designating them as information security threats. This methodology can prove useful to a wide variety of businesses and organizations who are seeking solutions to this long-standing threat. A Machine-Learning Approach to Phishing Detetion and Defense also provides information security researchers with a starting point for leveraging the machine algorithm approach as a solution to other information security threats.
    • How to Defeat Advanced Malware

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Simon Crosby
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 1 8
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 3 0
      How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization... The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization...
    • How to Define and Build an Effective Cyber Threat Intelligence Capability

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Eric Olson + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 0 1
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 2 3
      Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.
    • How to Attack and Defend Your Website

      • 1st Edition
      • December 5, 2014
      • Henry Dalziel
      • Alejandro Caceres
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 7 3 2 5
      • eBook
        9 7 8 0 1 2 8 0 2 7 5 4 7
      How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.
    • Optimizing IEEE 802.11i Resource and Security Essentials

      • 1st Edition
      • December 5, 2014
      • Iraj Sadegh Amiri + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 2 2 2 1
      • eBook
        9 7 8 0 1 2 8 0 2 2 2 3 8
      In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography.