Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
8,893 result(s) for "Davis, Peter T"
Sort by:
Wireless networks for dummies
You've probably heard the expression, \"It's time to cut the cord.\" Well, it may be time to \"cut the cables\" at your office and free yourself from your desk and computer. Wireless networks are the waves of the future—literally. Wireless Networks For Dummies guides you from design through implementation to ongoing protection of your system and your information so you can: * Remain connected to the office in airports and hotels * Access the Internet and other network resources in the lunchroom, conference room, or anywhere there's an access point * Use your PDA or laptop to query your database from the warehouse or the boardroom * Check e-mail wirelessly when you're on the road * Get rid of the cable clutter in your office Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm and an internationally known leader of security seminars. Peter Davis is founder of a firm specializing in the security, audit, and control of information. Together, they cut through the cables, clutter, and confusion and help you: * Get off to a quick start and get mobile with IrDA (Infrared Data Association) and Bluetooth * Perform a site survey and select the right standard, mode, access point, channel and antenna * Check online to verify degree of interoperability of devices from various vendors * Install clients and set up roaming * Combat security threats such as war driving, jamming, hijacking, and man-in-the-middle attacks * Implement security and controls such as MAC (Media Access Control) and protocol filtering, WEP (Wireless Equivalent Privacy), WPA, (Wi-Fi Protected Access), EAP (Extensible Authentication Protocol), and VPN (Virtual Private Network) * Set up multiple access points to form a larger wireless network Complete with suggestions of places to get connected, Web sites where you can get more information, tools you can use to monitor and improve security, and more, Wireless Networks For Dummies helps you pull the plug and go wireless!
Is it time to outsource security?
It's 2 a.m. and your intrusion detection sounds an alert. Your security staff scramble to find the source of the suspicious traffic hitting your network. Once they trace it back to the source, your security staff phones the IT department of the company running the suspect machine. It turns out the unauthorized traffic wasn't an attack, but a misconfigured SNMP device. False alarms unfortunately are all too common for intrusion detection technology. Companies can't rely on the software alone to determine whether, for instance, Internet Control Message Protocol traffic hitting a router is carrying legitimate messages to the device or instead is a denial-of-service attack. Intrusion detection software itself has a long way to go before it's truly automated. An intrusion detection service must be customized to protect a company's internal applications such as accounts payable so its security software can defend against any attacks on that application. Even with all the potential automation for intrusion detection tools, they still require human interaction -- professionals with the requisite expertise, who can ascertain the difference between a real attack and a misconfigured SNMP device. You can never take the human element out of security. There's no silver bullet in security. Even where a company goes with an intrusion detection service provider, there are no guarantees its security tools and experts will catch every unauthorized PING or Trojan horse. Intrusion detection tools can't actually stop a denial-of-service attack, but they can at least give a heads-up when one is infiltrating a network. Intrusion detection shouldn't provide a false sense of security. There are still many attacks and events that aren't captured.
From Walden to Wall Street
In the absence of innovation in the field of conservation finance, a daunting funding gap faces conservationists aiming to protect America's system of landscapes that provide sustainable resources, water, wildlife habitat, and recreational amenities.
Quantitative techniques for competition and antitrust analysis
This book combines practical guidance and theoretical background for analysts using empirical techniques in competition and antitrust investigations. Peter Davis and Eliana Garcés show how to integrate empirical methods, economic theory, and broad evidence about industry in order to provide high-quality, robust empirical work that is tailored to the nature and quality of data available and that can withstand expert and judicial scrutiny. Davis and Garcés describe the toolbox of empirical techniques currently available, explain how to establish the weight of pieces of empirical work, and make some new theoretical contributions. The book consistently evaluates empirical techniques in light of the challenge faced by competition analysts and academics--to provide evidence that can stand up to the review of experts and judges. The book's integrated approach will help analysts clarify the assumptions underlying pieces of empirical work, evaluate those assumptions in light of industry knowledge, and guide future work aimed at understanding whether the assumptions are valid. Throughout, Davis and Garcés work to expand the common ground between practitioners and academics.
Observed interannual changes beneath Filchner-Ronne Ice Shelf linked to large-scale atmospheric circulation
Floating ice shelves are the Achilles’ heel of the Antarctic Ice Sheet. They limit Antarctica’s contribution to global sea level rise, yet they can be rapidly melted from beneath by a warming ocean. At Filchner-Ronne Ice Shelf, a decline in sea ice formation may increase basal melt rates and accelerate marine ice sheet mass loss within this century. However, the understanding of this tipping-point behavior largely relies on numerical models. Our new multi-annual observations from five hot-water drilled boreholes through Filchner-Ronne Ice Shelf show that since 2015 there has been an intensification of the density-driven ice shelf cavity-wide circulation in response to reinforced wind-driven sea ice formation in the Ronne polynya. Enhanced southerly winds over Ronne Ice Shelf coincide with westward displacements of the Amundsen Sea Low position, connecting the cavity circulation with changes in large-scale atmospheric circulation patterns as a new aspect of the atmosphere-ocean-ice shelf system. New data from five hot-water drilled boreholes show how atmospheric anomalies affect the circulation beneath Filchner-Ronne Ice Shelf on multi-year time scales. The apparent link of the dense water formation to remote teleconnections is an important step for better predicting contributions to future sea level rise from this sector of Antarctica.
Imaging the energy gap modulations of the cuprate pair-density-wave state
The defining characteristic 1 , 2 of Cooper pairs with finite centre-of-mass momentum is a spatially modulating superconducting energy gap Δ ( r ), where r is a position. Recently, this concept has been generalized to the pair-density-wave (PDW) state predicted to exist in copper oxides (cuprates) 3 , 4 . Although the signature of a cuprate PDW has been detected in Cooper-pair tunnelling 5 , the distinctive signature in single-electron tunnelling of a periodic Δ ( r ) modulation has not been observed. Here, using a spectroscopic technique based on scanning tunnelling microscopy, we find strong Δ ( r ) modulations in the canonical cuprate Bi 2 Sr 2 CaCu 2 O 8+ δ that have eight-unit-cell periodicity or wavevectors Q  ≈ (2π/ a 0 )(1/8, 0) and Q  ≈ (2π/ a 0 )(0, 1/8) (where a 0 is the distance between neighbouring Cu atoms). Simultaneous imaging of the local density of states N ( r ,  E ) (where E is the energy) reveals electronic modulations with wavevectors Q and 2 Q , as anticipated when the PDW coexists with superconductivity. Finally, by visualizing the topological defects in these N ( r ,  E ) density waves at 2 Q , we find them to be concentrated in areas where the PDW spatial phase changes by π, as predicted by the theory of half-vortices in a PDW state 6 , 7 . Overall, this is a compelling demonstration, from multiple single-electron signatures, of a PDW state coexisting with superconductivity in Bi 2 Sr 2 CaCu 2 O 8+ δ . Using a spectroscopic technique based on scanning tunnelling microscopy, the superconducting energy gap modulations in a copper oxide are visualized, demonstrating that a pair-density-wave state coexists with superconductivity.