Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... | | Computational Line Geometry (Mathematics and Visualization)The geometry of lines occurs naturally in such different areas as sculptured surface machining, computation of offsets and medial axes, surface reconstruction for reverse engineering, geometrical optics, kinematics and motion design, and modeling of developable surfaces. This book covers line geometry from various viewpoints and aims towards... | | Business Statistics: Contemporary Decision Making
Help your students see the light.
With its myriad of techniques, concepts and formulas, business statistics can be overwhelming for many students. They can have trouble recognizing the importance of studying statistics, and making connections between concepts.
Ken Black's fifth edition of Business Statistics:... |