![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
Complex Analysis with Mathematica offers a new way of learning and teaching a subject that lies at the heart of many areas of pure and applied mathematics, physics, engineering and even art. This book offers teachers and students an opportunity to learn about complex numbers in a state-of-the-art computational environment. The innovative approach also offers insights into many areas too often neglected in a student treatment, including complex chaos and mathematical art. Thus readers can also use the book for self-study and for enrichment. The use of Mathematica enables the author to cover several topics that are often absent from a traditional treatment. Students are also led, optionally, into cubic or quartic equations, investigations of symmetric chaos and advanced conformal mapping. A CD is included which contains a live version of the book: in particular all the Mathematica code enables the user to run computer experiments.
The world has changed since the first edition was published in 2006. There have been many technological changes in communications and networking and in other areas of computer science. More focus is given to implementing cybersecurity protections and technical countermeasures. The second edition also takes advantage of the evolved industry-specific cybersecurity standards that have emerged, especially in the electric power and oil-and-gas pipeline industry sectors. Cybersecurity for SCADA Systems, 2nd Edition is intended to provide a general background of SCADA system technology and cybersecurity concepts and technologies, showing how the two can be brought together to safeguard our infrastructure and computer automation systems. This book provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues and learn strategies for decreasing or eliminating system vulnerabilities. Cybersecurity for SCADA Systems, 2nd Edition is suitable for nontechnical, management-level personnel as well as IT personnel without SCADA experience. Features and Benefits Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system IT and cybersecurity technology and terminology overview and explanation Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies Discussion of physical and electronic security issues and strategies Audience IT personnel Management Students
Additional Contributor Is John W. Aldrich. Plates By E. R. Kalmbach And Roger Tory Peterson. Foreword By Garrett Eddy.
Additional Contributor Is John W. Aldrich. Plates By E. R. Kalmbach And Roger Tory Peterson. Foreword By Garrett Eddy.
|
![]() ![]() You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
![]()
|