'An Introduction to Integral Transforms' is meant for students pursuing graduate and post graduate studies in Science and Engineering. It contains discussions on almost all transforms for normal users of the subject. The content of the book is explained from a rudimentary stand point to an advanced ..
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of t..
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of t..
This title was first published in 2002: Questioning the most fundamental assumptions of international relations theory, this absorbing work compares and contrasts domestic and international politics regarding the issues of order and disorder taking into account aspects of the two realms which have b..
This title was first published in 2002: Questioning the most fundamental assumptions of international relations theory, this absorbing work compares and contrasts domestic and international politics regarding the issues of order and disorder taking into account aspects of the two realms which have b..
In Ancient Egypt and Modern Psychotherapy, Todd Hayen explores what the spiritual concepts of the enigmatic ancient Egyptians can teach us about our own modern psyches and the pursuit of a meaningful life.
Hayen examines the ancient Egyptians’ possession of a concept contemporary academics have lab..
In Ancient Egypt and Modern Psychotherapy, Todd Hayen explores what the spiritual concepts of the enigmatic ancient Egyptians can teach us about our own modern psyches and the pursuit of a meaningful life.
Hayen examines the ancient Egyptians’ possession of a concept contemporary academics have lab..
‘We are all Greeks. Our laws, our literature, our religion, our arts, have their root in Greece’, the poet Percy Bysshe Shelley once wrote. It is in Greek that the questions which shaped the destiny of Western culture were asked, and so were the first attempts at an answer, and the search for a meth..
‘We are all Greeks. Our laws, our literature, our religion, our arts, have their root in Greece’, the poet Percy Bysshe Shelley once wrote. It is in Greek that the questions which shaped the destiny of Western culture were asked, and so were the first attempts at an answer, and the search for a meth..
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threa..
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threa..
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security perspective. Starting with an introduction to Android OS architecture and application programming, it will help readers get up to speed on the basics..