Search Results - ("algorithm" OR "algorithms")
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 250
- Mathematical models 220
- Mathematics 191
- Algorithms 134
- Artificial intelligence 127
- algorithms 122
- Machine learning 119
- Computer algorithms 93
- methods 85
- artificial intelligence 82
- Mathematical optimization 79
- Data mining 78
- Computer networks 65
- Digital techniques 62
- Diseases 59
- Signal processing 58
- Technological innovations 58
- Computer simulation 56
- Research 56
- Computer science 53
- Artificial Intelligence 50
- Social aspects 49
- Statistical methods 48
- Image processing 47
- Information technology 45
- Security measures 44
- Bioinformatics 42
- Data Mining 42
- Numerical analysis 42
- Wireless communication systems 42
-
3201
Penetration testing : a hands-on introduction to hacking
Published 2014Table of Contents: “…Online Password Attacks / Peter Van Eeckhoutte -- Wordlists / Peter Van Eeckhoutte -- Guessing Usernames and Passwords with Hydra / Peter Van Eeckhoutte -- Offline Password Attacks / Peter Van Eeckhoutte -- Recovering Password Hashes from a Windows SAM File / Peter Van Eeckhoutte -- Dumping Password Hashes with Physical Access / Peter Van Eeckhoutte -- LM vs. NTLM Hashing Algorithms / Peter Van Eeckhoutte -- The Trouble with LM Password Hashes / Peter Van Eeckhoutte -- John the Ripper / Peter Van Eeckhoutte -- Cracking Linux Passwords / Peter Van Eeckhoutte -- Cracking Configuration File Passwords / Peter Van Eeckhoutte -- Rainbow Tables / Peter Van Eeckhoutte -- Online Password-Cracking Services / Peter Van Eeckhoutte -- Dumping Plaintext Passwords from Memory with Windows Credential Editor / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 10. …”
Full text (MFA users only)
Electronic eBook -
3202
Public safety networks from LTE to 5G
Published 2020Table of Contents: “…6.3.2 Priority Control 100 -- 6.4 Public Safety Standardization 100 -- 6.5 Flawless Mobile Broadband for Public Safety and Security 101 -- 6.6 Applications in Different Scenarios 102 -- 6.7 Public Safety Systems and Architectures 103 -- 6.7.1 Airwave 103 -- 6.7.2 LMR 104 -- 6.7.3 TETRA Security Analysis 105 -- 6.7.4 TETRA Services System 106 -- 6.7.5 The Architecture of TETRA 106 -- 6.7.5.1 The Interfaces of TETRA Network 106 -- 6.7.6 TETRA Network Components 106 -- 6.7.6.1 The Mobile Station 108 -- 6.7.6.2 TETRA Line Station 108 -- 6.7.6.3 The Switching Management Infrastructure 108 -- 6.7.6.4 Network Management Unit 108 -- 6.7.6.5 The Gateways 108 -- 6.7.6.6 How the TETRA System Operates 108 -- 6.7.7 TETRA Mobility Management 109 -- 6.7.8 The Security of TETRA Networks 109 -- 6.7.8.1 Confidentiality 109 -- 6.7.8.2 Integrity 109 -- 6.7.8.3 Reliability 109 -- 6.7.8.4 Non-repudiation 109 -- 6.7.8.5 Authentication 110 -- 6.7.9 The Process of Authentication in TETRA 110 -- 6.7.10 The Authentication Key 110 -- 6.7.11 Symmetric Key Algorithms 110 -- 6.7.12 The Process of Authentication Key Generation 111 -- 6.7.12.1 ESN (In United Kingdom) 111 -- 6.8 Emergency Services Network (ESN) in the United Kingdom 112 -- 6.8.1 Overview of the ESN 112 -- 6.8.2 The Deliverables of ESN 112 -- 6.8.3 The Main Deliverables of ESN 112 -- 6.9 SafeNet in South Korea 113 -- 6.10 FirstNet (in USA) 115 -- 6.10.1 The Benefits of FirstNet 117 -- 6.10.2 Public Safety Core of SafetyNet 117 -- 6.10.2.1 End-to-End Encryption 117 -- 6.10.3 Round the Clock Security Surveillance 118 -- 6.10.4 User Authentication 118 -- 6.10.5 Mission Critical Functionalities 118 -- 6.10.5.1 Tactical LTE Coverage 118 -- 6.11 Canadian Interoperability Technology Interest Group (CITIG) 118 -- 6.12 Centre for Disaster Management and Public Safety (CDMPS) at the University of Melbourne 119 -- 6.13 European Emergency Number Association (EENA) 120 -- 6.13.1 European Standardization Organization (ESO) 121 -- 6.13.2 Public Safety Communications -- Europe (PSCE) 121.…”
Full text (MFA users only)
Electronic eBook -
3203
Analyzing neural time series data : theory and practice
Published 2014Table of Contents: “…What Is the Surface Laplacian? -- 22.2. Algorithms for Computing the Surface Laplacian for EEG Data -- 22.3. …”
Full text (MFA users only)
Electronic eBook -
3204
Ocular therapeutics handbook : a clinical manual
Published 2011Full text (MFA users only)
Electronic eBook -
3205
-
3206
Hierarchical matrices : a means to efficiently solve elliptic boundary value problems
Published 2008Full text (MFA users only)
Electronic eBook -
3207
How mathematicians think : using ambiguity, contradiction, and paradox to create mathematics.
Published 2010Full text (MFA users only)
Electronic eBook -
3208
-
3209
Cognitive radar : the knowledge-aided fully adaptive approach
Published 2010Full text (MFA users only)
Electronic eBook -
3210
Biomedical Imaging : Principles of Radiography, Tomography and Medical Physics
Published 2017Full text (MFA users only)
Electronic eBook -
3211
-
3212
Big data : un changement de paradigme peut en cacher un autre.
Published 2016Full text (MFA users only)
Electronic eBook -
3213
Autonomous bidding agents : strategies and lessons from the trading agent competition
Published 2007Full text (MFA users only)
Electronic eBook -
3214
Chance : the life of games and the game of life
Published 2008Full text (MFA users only)
Electronic eBook -
3215
Mathematical Logic in Asia : Proceedings of the 9th Asian Logic Conference.
Published 2006Full text (MFA users only)
Electronic eBook -
3216
-
3217
FRBR, before and after : a look at our bibliographic models
Published 2016Full text (MFA users only)
Electronic eBook -
3218
Le Fabuleux Chantier : Rendre l'intelligence Artificielle Robustement Bénéfique.
Published 2019Full text (MFA users only)
Electronic eBook -
3219
Physics and Theoretical Computer Science : From Numbers and Languages to (quantum) Cryptography.
Published 2007Full text (MFA users only)
Electronic eBook -
3220
Learning processing : a beginner's guide to programming images, animation, and interaction
Published 2015Full text (MFA users only)
Electronic eBook