Privacy Protection and Computer ForensicsArtech House, 2004 - 345 pagina's This extensively revised and expanded third edition of the Artech House bestseller, Computational Electrodynamics: The Finite-Difference Time-Domain Method, offers you the most up-to-date and definitive resource on this critical method for solving MaxwellOCOs equations. There has been considerable advancement in FDTD computational technology over the past few years, and this new edition brings you the very latest details with four new invited chapters on advanced techniques for PSTD, unconditional stability, provably stable FDTD-FETD hybrids, and hardware acceleration. Moreover, you find many completely new sections throughout the book, including major updates on convolutional PML ABCs; dispersive, nonlinear, classical-gain, and quantum-gain materials; and micro-, nano-, and bio- photonics." |
Inhoudsopgave
CXXXVIII | 179 |
CXXXIX | 180 |
CXL | 181 |
CXLI | 184 |
CXLII | 185 |
CXLIII | 187 |
CXLIV | 188 |
CXLV | 189 |
11 | |
13 | |
16 | |
XVIII | 22 |
XIX | 23 |
XXI | 26 |
XXII | 28 |
XXIII | 31 |
XXIV | 32 |
XXVI | 33 |
XXVII | 34 |
XXIX | 35 |
XXXII | 36 |
XXXV | 38 |
XXXVI | 39 |
XXXVII | 41 |
XXXVIII | 42 |
XL | 44 |
XLI | 45 |
XLIII | 49 |
XLIV | 53 |
XLVI | 54 |
XLVII | 57 |
XLVIII | 58 |
L | 59 |
LII | 60 |
LIV | 64 |
LVI | 65 |
LVII | 69 |
LIX | 70 |
LXI | 71 |
LXIV | 72 |
LXVI | 73 |
LXIX | 74 |
LXX | 75 |
LXXI | 76 |
LXXII | 77 |
LXXIII | 79 |
LXXIV | 81 |
LXXV | 82 |
LXXVII | 83 |
LXXVIII | 86 |
LXXIX | 88 |
LXXX | 91 |
LXXXII | 96 |
LXXXIII | 98 |
LXXXIV | 102 |
LXXXV | 104 |
LXXXVI | 105 |
LXXXVII | 106 |
XC | 108 |
XCI | 109 |
XCIII | 110 |
XCIV | 111 |
XCV | 112 |
XCVI | 114 |
XCVII | 115 |
XCVIII | 117 |
C | 118 |
CI | 121 |
CIII | 122 |
CIV | 124 |
CV | 125 |
CVI | 127 |
CVII | 128 |
CVIII | 133 |
CIX | 138 |
CX | 139 |
CXII | 141 |
CXIII | 144 |
CXIV | 148 |
CXV | 149 |
CXVI | 152 |
CXVII | 154 |
CXVIII | 158 |
CXIX | 159 |
CXXI | 160 |
CXXII | 161 |
CXXIV | 163 |
CXXV | 164 |
CXXVI | 167 |
CXXVII | 169 |
CXXVIII | 170 |
CXXIX | 171 |
CXXX | 172 |
CXXXI | 173 |
CXXXII | 174 |
CXXXIV | 175 |
CXXXVI | 176 |
CXXXVII | 178 |
CXLVI | 191 |
CXLVIII | 193 |
CXLIX | 195 |
CLI | 197 |
CLII | 200 |
CLIV | 201 |
CLV | 202 |
CLVI | 203 |
CLVII | 204 |
CLVIII | 208 |
CLIX | 209 |
CLX | 210 |
CLXI | 211 |
CLXII | 212 |
CLXIII | 213 |
CLXIV | 214 |
CLXV | 215 |
CLXVII | 216 |
CLXVIII | 218 |
CLXIX | 219 |
CLXXI | 220 |
CLXXII | 221 |
CLXXIII | 224 |
CLXXIV | 226 |
CLXXV | 233 |
CLXXVI | 234 |
CLXXVII | 235 |
CLXXIX | 236 |
CLXXXI | 238 |
CLXXXII | 239 |
CLXXXIV | 243 |
CLXXXV | 246 |
CLXXXVII | 247 |
CLXXXVIII | 248 |
CLXXXIX | 249 |
CXC | 252 |
CXCI | 253 |
CXCIII | 254 |
CXCV | 255 |
CXCVI | 256 |
CXCVII | 259 |
CXCVIII | 261 |
CXCIX | 262 |
CC | 263 |
CCI | 264 |
CCII | 265 |
CCIV | 266 |
CCV | 268 |
CCVI | 270 |
CCVII | 271 |
CCVIII | 272 |
CCIX | 273 |
CCX | 274 |
CCXI | 275 |
CCXII | 277 |
CCXIII | 278 |
CCXIV | 279 |
CCXVI | 281 |
CCXVII | 283 |
CCXVIII | 285 |
CCXIX | 286 |
CCXX | 287 |
CCXXI | 288 |
CCXXIII | 289 |
CCXXV | 290 |
CCXXVII | 291 |
CCXXIX | 293 |
CCXXX | 298 |
CCXXXI | 299 |
CCXXXII | 300 |
CCXXXIII | 301 |
CCXXXV | 303 |
CCXXXVII | 305 |
CCXXXIX | 308 |
CCXL | 309 |
CCXLI | 312 |
CCXLII | 315 |
CCXLIII | 318 |
CCXLIV | 319 |
CCXLV | 320 |
CCXLVIII | 321 |
CCL | 326 |
CCLI | 327 |
CCLIII | 328 |
CCLIV | 331 |
CCLV | 332 |
CCLVI | 333 |
CCLVII | 335 |
Veelvoorkomende woorden en zinsdelen
adware algorithm allow anonymous attacks backups biometrics bits Bluetooth browser commercial communications companies computer forensics configuration connection copy court created crime decrypt deleted detect devices digital watermark disable document e-mail e-mail address electronic encrypted file encryption key evidence example Figure firewall floppy folder forensic investigator full disk encryption hard disk hide identify illegal individual installed intended recipient interception Internet Explorer IP address IPsec keystroke law enforcement magnetic Microsoft monitor Netscape one's computer openly available option overwrite password person plaintext problem programs protection proxy public key public-key encryption puter RAM disk regime Registry remailers remote remove RF ID ScramDisk Section sector sender server software packages steganography stored subpoenaed swap file technical threats tion unauthorized United Usenet user's vendors versions vulnerable watermark Web bug Wi-Fi Windows wiping
Populaire passages
Pagina 80 - Anonymous pamphlets, leaflets, brochures and even books have played an important role in the progress of mankind. Persecuted groups and sects from time to time throughout history have been able to criticize oppressive practices and laws either anonymously or not at all.
Pagina 314 - ... data compilations from which information can be obtained, translated, if necessary, by the respondent through detection devices into reasonably usable form), or to inspect and copy, test, or sample any tangible things which constitute or contain matters within the scope of...
Pagina 135 - This sone contains all Web sites you haven't placed in other zones Security level for this zone Custom Custom settings • To change the settings, click Custom Level. - To use the recommended settings, click Default Level.
Pagina 137 - Local Area Network (LAN) Settings Automatic configuration Automatic configuration may override manual settings. To ensure the use of manual settings, disable automatic configuration.
Pagina 82 - Civilization is the progress toward a society of privacy. The savage's whole existence is public, ruled by the laws of his tribe. Civilization is the process of setting man free from men.
Pagina 85 - Position" document clearly states that there is a "fundamental right to privacy with respect to the processing of personal data.
Pagina 159 - I virus a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Most viruses can also replicate themselves. All computer viruses are manmade.