7 resultater (0,22403 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

The Practice of Crowdsourcing - Omar Alonso - Bog - Springer International Publishing AG - Plusbog.dk

Machine Learning for Cybersecurity - Marwan Omar - Bog - Springer International Publishing AG - Plusbog.dk

Introduction to Calculus and Classical Analysis - Omar Hijab - Bog - Springer International Publishing AG - Plusbog.dk

Introduction to Calculus and Classical Analysis - Omar Hijab - Bog - Springer International Publishing AG - Plusbog.dk

Involving rigorous analysis, computational dexterity, and a breadth of applications, this text is ideal for an undergraduate honors calculus course or for an introduction to analysis. This fourth edition includes corrections as well as some additional material. Some features of the text:• The text is completely self-contained and starts with the real number axioms;• The integral is defined as the area under the graph, while the area is defined for every subset of the plane;• There is a heavy emphasis on computational problems, from the high-school quadratic formula to the formula for the derivative of the zeta function at zero;• There are applications from many parts of analysis, e.g., convexity, the Cantor set, continued fractions, the AGM, the theta and zeta functions, transcendental numbers, the Bessel and gamma functions, and many more;• Traditionally transcendentally presented material, such as infinite products, the Bernoulli series, and the zeta functional equation, is developed over the reals;• self-contained treatment of the fundamental theorems of calculus in the general case using the Sunrise Lemma• There are 450 problems with all the solutions at the back of the text. Reviews from previous editions:"This is a very intriguing, decidedly unusual, and very satisfying treatment of calculus and introductory analysis. It's full of quirky little approaches to standard topics that make one wonder over and over again, 'Why is it never done like this?'"—John Allen Paulos, author of Innumeracy and A Mathematician Reads the Newspaper"Chapter 5 is... an astonishing tour de force"—Steven G. Krantz, The American Mathematical Monthly"For a treatment [of infinite products and the Bernoulli series] that is very close to Euler’s and even more elementary..." — V.S. Varadarajan, Bulletin of the American Mathematical Society

DKK 341.00
1

Defending Cyber Systems through Reverse Engineering of Criminal Malware - Marwan Omar - Bog - Springer International Publishing AG - Plusbog.dk

Defending Cyber Systems through Reverse Engineering of Criminal Malware - Marwan Omar - Bog - Springer International Publishing AG - Plusbog.dk

This SpringerBrief discusses underlying principles of malware reverse engineering and introduces the major techniques and tools needed to effectively analyze malware that targets business organizations. It also covers the examination of real-world malware samples, which illustrates the knowledge and skills necessary to take control of cyberattacks. This SpringerBrief explores key tools and techniques to learn the main elements of malware analysis from the inside out. It also presents malware reverse engineering using several methodical phases, in order to gain a window into the mind set of hackers. Furthermore, this brief examines malicious program''s behavior and views its code-level patterns. Real world malware specimens are used to demonstrate the emerging behavioral patterns of battlefield malware as well. This SpringerBrief is unique, because it demonstrates the capabilities of emerging malware by conducting reverse-code engineering on real malware samples and conducting behavioral analysis in isolated lab system. Specifically, the author focuses on analyzing malicious Windows executables. This type of malware poses a large threat to modern enterprises. Attackers often deploy malicious documents and browser-based exploits to attack Windows enterprise environment. Readers learn how to take malware inside-out using static properties analysis, behavioral analysis and code-level analysis techniques. The primary audience for this SpringerBrief is undergraduate students studying cybersecurity and researchers working in this field. Cyber security professionals that desire to learn more about malware analysis tools and techniques will also want to purchase this SpringerBrief.

DKK 367.00
1

Post-Arab Spring Narratives - Abida Younas - Bog - Springer International Publishing AG - Plusbog.dk