-
Feedback Control for Computer Systems
Author Philipp K. Janert
How can you take advantage of feedback control for enterprise programming? With this book, author Philipp K. Janert demonstrates how the same principles that govern cruise control in your car also apply to data center management and other enterprise systems. Through....
Release Date 2013/10 -
Formation Control of Multiple Autonomous Vehicle Systems
Author Bo Zhu , Hugh H. T. Liu
This text explores formation control of vehicle systems and introduces three representative systems: space systems, aerial systems and robotic systemsFormation Control of Multiple Autonomous Vehicle Systems offers a review of the core concepts of dynamics and contr....
Release Date 2018/08 -
Foundation Version Control for Web Developers
Author Ian Oxley , Chris Kemper
Foundation Version Control for Web Developers explains how version control works, what you can do with it and how. Using a friendly and accessible tone, you will learn how to use the three leading version control systems—Subversion, Git and Mercurial—on multiple ope....
Release Date 2012/03 -
Fuzzy Control and Identification
Author John H. Lilly
This book gives an introduction to basic fuzzy logic and Mamdani and Takagi-Sugeno fuzzy systems. The text shows how these can be used to control complex nonlinear engineering systems, while also also suggesting several approaches to modeling of complex engineering ....
Release Date 2010/12 -
GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Author Nick Mitropoulos
This self-study guide delivers complete coverage of every topic on the GIAC Certified Incident Handler examPrepare for the challenging GIAC Certified Incident Handler exam using the detailed information contained in this effective exam preparation guide. Written by a reco....
Release Date 2020/08 -
Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
Author Stephen Hilt , Kyle Wilhoit , Aaron Shbeeb , Bryan Singer , Clint Bodungen
Learn to defend crucial ICS/SCADA infrastructure from devastating attacks the tried-and-true Hacking Exposed wayThis practical guide reveals the powerful weapons and devious methods cyber-terrorists use to compromise the devices, applications, and systems vital to ....
Release Date 2016/09 -
Hands-on Incident Response and Digital Forensics
Author Mike Sheward
Incident response is the method by which organisations take steps to identify and recover from an information security incident, with as little impact as possible on business as usual. Digital forensics is what follows - a scientific investigation into the causes o....
Release Date 2018/07 -
High-Speed Precision Motion Control
Author Justin Khiang Pang , Mitsuo Hirata , Takashi Yamaguchi
Edited by Takashi Yamaguchi, Mitsuo Hirate, and Chee Khiang Pang, with contributions from pioneers known for their ground-breaking work, High-Speed Precision Motion Control discusses high-precision and fast servo controls in hard disk drives (HDDs). The chapter auth....
Release Date 2017/07 -
How Did I Not See This Coming?: A New Manager's Guide to Avoiding Total Disaster
Author Katy Tynan
Julie’s having a very bad day. She’s a new manager, and her top performer has resigned to escape her, and her own manager is looking on with a skeptical eye. . . . This is the story of her turnaround. Being a first-time manager is a tough job. If you ....
Release Date 2017/12 -
How to Become an International Disaster Volunteer
Author Michael Noone
How to Become an International Disaster Volunteer discusses the immense value an experienced water systems engineer, trauma surgeon, or communications specialist could bring to a disaster stricken community, while also explaining how their professional educations d....
Release Date 2017/02 -
How to Control Your Finances After You Are Laid Off
Author Martha I. Finney
This Element is an excerpt from Rebound: A Proven Plan for Starting Over After Job Loss (ISBN: 9780137021147) by Martha I. Finney. Available in print and digital formats.Laid off? Get control of your money, and protect your long-term finances, without denying yours....
Release Date 2010/02 -
How to Measure Anything in Cybersecurity Risk, 2nd Edition
Author Douglas W. Hubbard , Richard Seiersen
A start-to-finish guide for realistically measuring cybersecurity riskIn the newly revised How to Measure Anything in Cybersecurity Risk, Second Edition, a pioneering information security professional and a leader in quantitative analysis methods delivers yet another eye-opening text applying the qu....
Release Date 2023/04 -
How to Use Questions to Maintain Direction and Control of the Agenda
Author Terry J. Fadem
This Element is an excerpt from The Art of Asking: Ask Better Questions, Get Better Answers (9780137144242) by Terry J. Fadem. Available in print and digital formats.Learn questioning techniques that help you control the agenda, overcome challenges, and move forward....
Release Date 2010/03 -
Author Chris P. Underwood
This important new book bridges the gap between works on classical control and process control, and those dealing with HVAC control at a more elementary level, which generally adopt a qualitative and descriptive control. Both advanced level students and specialist p....
Release Date 2002/09 -
Author Ric Messier
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, thi....
Release Date 2019/12 -
Incident Response Techniques for Ransomware Attacks
Author Oleg Skulkin
Explore the world of modern human-operated ransomware attacks, along with covering steps to properly investigate them and collecting and analyzing cyber threat intelligence using cutting-edge methods and toolsKey FeaturesUnderstand modern human-operated cyber attacks, focusing on threat actor tactic....
Release Date 2022/04 -
Incident Response with Threat Intelligence
Author Roberto Martínez
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligenceKey FeaturesUnderstand best practices for detecting, containing, and recovering from modern cyber threatsGet practical experience embracing incident response using intelli....
Release Date 2022/06 -
Indoor Navigation Strategies for Aerial Autonomous Systems
Author Pedro Garcia Gil , Laura Elena Munoz Hernandez , Pedro Castillo-Garcia
Indoor Navigation Strategies for Aerial Autonomous Systems presents the necessary and sufficient theoretical basis for those interested in working in unmanned aerial vehicles, providing three different approaches to mathematically represent the dynamics of an aeria....
Release Date 2016/11 -
Author Pascal Ackerman
Your one-step guide to understanding industrial cyber security, its control systems, and its operations.About This BookLearn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devicesFilled ....
Release Date 2017/10 -
Author RJ Andrews
How do we create new ways of looking at the world? Join award-winning data storyteller RJ Andrews as he pushes beyond the usual how-to, and takes you on an adventure into the rich art of informing.Creating Info We Trust is a craft that puts the world into forms tha....
Release Date 2019/01 -
Author Mary M. Somerville
By fostering principles of systems thinking and informed learning though an inclusive, participatory design process that advances information exchange, reflective dialogue, and knowledge creation, the Informed Systems Approach promotes conceptual change in workplace....
Release Date 2015/07 -
Integrated Vehicle Dynamics and Control
Author Maofei Zhu , Linfeng Zhao , Qidong Wang , Hansong Xiao , Wuwei Chen
A comprehensive overview of integrated vehicle system dynamics exploring the fundamentals and new and emerging developmentsThis book provides a comprehensive coverage of vehicle system dynamics and control, particularly in the area of integrated vehicle dynamics co....
Release Date 2016/05 -
Integrating Emergency Management and Disaster Behavioral Health
Author Ronald Sherman , Brian Flynn
Integrating Emergency Management and Disaster Behavioral Health identifies the most critical areas of integration between the profession of emergency management and the specialty of disaster behavioral health, providing perspectives from both of these critical area....
Release Date 2017/01 -
Integrating Program Management and Systems Engineering
Author Eric Rebentisch
Integrate critical roles to improve overall performance in complex engineering projectsIntegrating Program Management and Systems Engineering shows how organizations can become more effective, more efficient, and more responsive, and enjoy better performance outcom....
Release Date 2017/02 -
Intelligence-Driven Incident Response
Author Scott J. Roberts , Rebekah Brown
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly und....
Release Date 2017/08 -
Intelligent Automatic Generation Control
Author Takashi Hiyama , Hassan Bevrani
Automatic generation control (AGC) is one of the most important control problems in the design and operation of interconnected power systems. Its significance continues to grow as a result of several factors: the changing structure and increasing size, complexity, a....
Release Date 2017/12 -
Intelligent Coatings for Corrosion Control
Author James Rawlins , Lloyd Hihara , Atul Tiwari
Intelligent Coatings for Corrosion Control covers the most current and comprehensive information on the emerging field of intelligent coatings. The book begins with a fundamental discussion of corrosion and corrosion protection through coatings, setting the stage fo....
Release Date 2014/10 -
Author Zhaoyu Pian , Xiangping Meng
Intelligent Coordinated Control of Complex Uncertain Systems for Power Distribution and Network Reliability discusses the important topics revolving around the control of complex uncertain systems using the intelligent coordination control mechanism, a topic ....
Release Date 2015/11 -
Author Subir Varma
Internet Congestion Control provides a description of some of the most important topics in the area of congestion control in computer networks, with special emphasis on the analytical modeling of congestion control algorithms.The field of congestion control has seen....
Release Date 2015/08 -
IT Systems Management, Second Edition
Author Rich Schiesser
The best-practice guide to managing IT infrastructures–now fully updated!IT Systems Management is an up-to-the-minute guide to maintaining stable, responsive IT production environments. Top IT systems management expert Rich Schiesser illuminates both the theoretical....
Release Date 2010/01