Listing 1 - 10 of 3819 | << page >> |
Sort by
|
Choose an application
Choose an application
Choose an application
The performance of sphere decoding of block codes over a variety of channels is investigated. We derive a tight bound on the performance of maximum likelihood decoding of linear codes on q-ary symmetric channels. We use this result to bound the performance of q-ary hard decision sphere decoders. We also derive a tight bound on the performance of soft decision sphere decoders on the AWGN channel for BPSK and M-PSK modulated block codes. The performance of soft decision sphere decoding of arbitrary finite lattices or block codes is also analyzed.
Choose an application
Choose an application
Choose an application
This book brings together key ideas about record keeping in a multi-media environment. Written by leading figures in the fieldComprehensive coverage of the topicContains the most up-to-date information.
Choose an application
Provides information on Winternals tools that are used in many Microsoft networks worldwide. This book begins with a chapter describing the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. It also introduces a suite of Winternals solutions, including Recovery Manager.
Choose an application
Choose an application
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader inside their heads to unravel the mysteries of thins like identifying targets, enumerating hosts, application fingerprinting, cracking passwords, and attacking exposed vulnerabilities. Along the way, the authors provide an invaluable reference to the hundreds of tools included on the bootable-Linux CD for penetration testing. * Covers both the methodology of penetration testing and all of the tools used by malicious hackers and penetration testers * The book is authored by many of the tool developers themselves * This is the only book that comes packaged with the "Auditor Security Collection"; a bootable Linux CD with over 300 of the most popular open source penetration testing tools.
Choose an application
Listing 1 - 10 of 3819 | << page >> |
Sort by
|