﻿<?xml version="1.0" encoding="utf-8"?>
<?xml-stylesheet type="text/xsl" href="/Library/Content/XSLTs/rss.xsl"?>
<rss version="2.0">
  <channel>
    <title>Most Searched Titles</title>
    <link>https://nu.insigniails.com</link>
    <language>en-ca</language>
    <generator>Rss Generator By insigniasoftware.com</generator>
    <item>
      <title>Automata, Languages and Programming : 36th Internatilonal Collogquium, ICALP 2009, Rhodes, greece, July 5-12, 2009, Proceedings, Part II</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Automata, Languages and Programming : 36th Internatilonal Collogquium, ICALP 2009, Rhodes, greece, July 5-12, 2009, Proceedings, Part II&amp;LibraryID=All</link>
      <author>Albers, Susanne.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Automata, Languages and Programming : 36th Internatilonal Collogquium, ICALP 2009, Rhodes, greece, July 5-12, 2009, Proceedings, Part II&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI84380.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;      &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2009&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>The internet of things : enabling technologies, platforms, and use cases.</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=The internet of things : enabling technologies, platforms, and use cases.&amp;LibraryID=All</link>
      <author>Raj, Pethuru</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=The internet of things : enabling technologies, platforms, and use cases.&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI85995.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Include Bibliography, Reference, Index. Forward
Preface 
Acknowledgments
About the Authors
1. Demystifying the IoT paradigm
2. Realization of IoT ecosystem using wireless technologies
3. Infrastructure and service discovery protocols for the IoT ecosystem
4. The integration technologies and tools for Iot environment
5. The ennoblement platforms for Iot applications and analytics\
6. The next- generation clouds for IoT applications and analytics
7. Describing the emerging field of IoT data analytics
8. Expounding the Edge/Fog computing paradigm
9. Envisioning futuristic smart airports using IoT integration
10. Envisioning smart health care system in connected world
11. Smart use cases of IoT
12. Security management of an IoT ecosystem
Index.  As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality.

The book begins with a discussion of IoT &amp;quot;ecosystems&amp;quot; and the technology that enables them, which includes:

Wireless
Infrastructure and Service Discovery Protocols
Integration Technologies and Tools
Application and Analytics Enablement Platforms
A chapter on next-generation cloud infrastructure explains hosting IoT platforms and applications. A chapter on data analytics throws light on IoT data collection, storage, translation, real-time processing, mining, and analysis, all of which can yield actionable insights from the data collected by IoT applications. There is also a chapter on edge/fog computing.

The second half of the book presents various IoT ecosystem use cases. One chapter discusses smart airports and highlights the role of IoT integration. It explains how mobile devices, mobile technology, wearables, RFID sensors, and beacons work together as the core technologies of a smart airport. Integrating these components into the airport ecosystem is examined in detail, and use cases and real-life examples illustrate this IoT ecosystem in operation. Another in-depth look is on envisioning smart healthcare systems in a connected world. This chapter focuses on the requirements, promising applications, and roles of cloud computing and data analytics. The book also examines smart homes, smart cities, and smart governments.

The book concludes with a chapter on IoT security and privacy. This chapter examines the emerging security and privacy requirements of IoT environments. The security issues and an assortment of surmounting techniques and best practices are also discussed in this chapter. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2017&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>PAIGHAMBAR MUHAMMAD (P.B.U.H) KI SHAKHSIYAT</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=PAIGHAMBAR MUHAMMAD (P.B.U.H) KI SHAKHSIYAT&amp;LibraryID=All</link>
      <author>Khan, Abdul Waheed</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=PAIGHAMBAR MUHAMMAD (P.B.U.H) KI SHAKHSIYAT&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI112656.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;     The book gives details of life and personality of Prophet Muhammad (P.B.U.H).
. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2013&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Analyzing computer security : a threat/vulnerability/countermeasure approach</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Analyzing computer security : a threat/vulnerability/countermeasure approach&amp;LibraryID=All</link>
      <author>Pfleeger, Charles P., 1948-</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Analyzing computer security : a threat/vulnerability/countermeasure approach&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI89938.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;   Foreword xxiii
Preface xxvii
About the Authors xxxv
 
Chapter 1: Security Blanket or Security Theater? 2
How Dependent Are We on Computers? 6
What Is Computer Security? 8
Threats 11
Harm 24
Vulnerabilities 30
Controls 30
Analyzing Security With Examples 33
Conclusion 34
Exercises 35
Chapter 2: Knock, Knock. Who’s There? 38
Attack: Impersonation 39
Attack Details: Failed Authentication 40
Vulnerability: Faulty or Incomplete Authentication 41
Countermeasure: Strong Authentication 47
Conclusion 64
Recurring Thread: Privacy 67
Recurring Thread: Usability 69
Exercises 71
Chapter 3: 2 + 2 = 5   72
Attack: Program Flaw in Spacecraft Software 74
Threat: Program Flaw Leads to Security Failing 75
Vulnerability: Incomplete Mediation 77
Vulnerability: Race Condition 79
Vulnerability: Time-of-Check to Time-of-Use 82
Vulnerability: Undocumented Access Point 84
Ineffective Countermeasure: Penetrate-and-Patch 85
Countermeasure: Identifying and Classifying Faults 86
Countermeasure: Secure Software Design Elements 90
Countermeasure: Secure Software Development Process 97
Good Design 103
Countermeasure: Testing 114
Countermeasure: Defensive Programming 122
Conclusion 123
Recurring Thread: Legal—Redress for Software Failures 125
Exercises 128
Chapter 4: A Horse of a Different Color 130
Attack: Malicious Code 131
Threat: Malware—Virus, Trojan Horse, and Worm 132
Technical Details: Malicious Code 138
Vulnerability: Voluntary Introduction 155
Vulnerability: Unlimited Privilege 157
Vulnerability: Stealthy Behavior—Hard to Detect and Characterize 157
Countermeasure: Hygiene 158
Countermeasure: Detection Tools 159
Countermeasure: Error Detecting and Error Correcting Codes 166
Countermeasure: Memory Separation 170
Countermeasure: Basic Security Principles 171
Recurring Thread: Legal—Computer Crime 172
Conclusion 177
Exercises 178
Chapter 5: The Keys to the Kingdom 180
Attack: Keylogging 181
Threat: Illicit Data Access 182
Attack Details 182
Harm: Data and Reputation 186
Vulnerability: Physical Access 186
Vulnerability: Misplaced Trust 187
Vulnerability: Insiders 189
Vulnerability: System Subversion 191
Recurring Thread: Forensics—Tracing Data Flow 193
Vulnerability: Weak Authentication 194
Failed Countermeasure: Security through Obscurity 194
Countermeasure: Physical Access Control 196
Countermeasure: Strong Authentication 198
Countermeasure: Trust/Least Privilege 202
Conclusion 204
Recurring Thread: Forensics—Plug-and-Play Devices 205
Exercises 207
Interlude A: Cloud Computing 210
What Is Cloud Computing? 211
What Are the Risks in the Cloud? 213
Chapter 6: My Cup Runneth Over 216
Attack: What Did You Say That Number Was? 217
Harm: Destruction of Code and Data 218
Vulnerability: Off-by-One Error 230
Vulnerability: Integer Overflow 231
Vulnerability: Unterminated Null-Terminated String 232
Vulnerability: Parameter Length and Number 233
Vulnerability: Unsafe Utility Programs 234
Attack: Important Overflow Exploitation Examples 234
Countermeasure: Programmer Bounds Checking 244
Countermeasure: Programming Language Support 244
Countermeasure: Stack Protection/Tamper Detection 247
Countermeasure: Hardware Protection of Executable Space 249
Countermeasure: General Access Control 261
Conclusion 272
Exercises 274
Chapter 7: He Who Steals My Purse . . .  276
Attack: Veterans’ Administration Laptop Stolen 277
Threat: Loss of Data 278
Extended Threat: Disaster 278
Vulnerability: Physical Access 279
Vulnerability: Unprotected Availability of Data 279
Vulnerability: Unprotected Confidentiality of Data 279
Countermeasure: Policy 280
Countermeasure: Physical Security 280
Countermeasure: Data Redundancy (Backup) 282
Countermeasure: Encryption 286
Countermeasure: Disk Encryption 325
Conclusion 326
Exercises 329
Chapter 8: The Root of All Evil 332
Background: Operating System Structure 333
Attack: Phone Rootkit 337
Attack Details: What Is a Rootkit? 338
Vulnerability: Software Complexity 347
Vulnerability: Difficulty of Detection and Eradication 347
Countermeasure: Simplicity of Design 348
Countermeasure: Trusted Systems 353
Conclusion 364
Exercises 365
Chapter 9: Scanning the Horizon 368
Attack: Investigation, Intrusion, and Compromise 369
Threat: Port Scan 370
Attack Details 371
Harm: Knowledge and Exposure 374
Recurring Thread: Legal—Are Port Scans Legal? 375
Vulnerability: Revealing Too Much 376
Vulnerability: Allowing Internal Access 376
Countermeasure: System Architecture 377
Countermeasure: Firewall 378
Countermeasure: Network Address Translation (NAT) 397
Countermeasure: Security Perimeter 399
Conclusion 400
Exercises 402
Chapter 10: Do You Hear What I Hear? 404
Attack: Wireless (WiFi) Network Access 405
Harm: Confidentiality–Integrity–Availability 412
Attack: Unauthorized Access 414
Vulnerability: Protocol Weaknesses 414
Failed Countermeasure: WEP 418
Stronger but Not Perfect Countermeasure: WPA and WPA2 422
Conclusion 426
Recurring Thread: Privacy—Privacy-Preserving Design 427
Exercises 429
Chapter 11: I Hear You Loud and Clear 432
Attack: Enemies Watch Predator Video 433
Attack Details 434
Threat: Interception 437
Vulnerability: Wiretapping 441
Countermeasure: Encryption 448
Countermeasure: Virtual Private Networks 452
Countermeasure: Cryptographic Key Management Regime 456
Countermeasure: Asymmetric Cryptography 459
Countermeasure: Kerberos 464
Conclusion 468
Recurring Thread: Ethics—Monitoring Users 471
Exercises 472
Interlude B: Electronic Voting 474
What Is Electronic Voting? 475
What Is a Fair Election? 477
What Are the Critical Issues? 477
Chapter 12: Disregard That Man Behind the Curtain 482
Attack: Radar Sees Only Blue Skies 483
Threat: Man in the Middle 484
Threat: “In-the-Middle” Activity 487
Vulnerability: Unwarranted Trust 498
Vulnerability: Failed Identification and Authentication 499
Vulnerability: Unauthorized Access 501
Vulnerability: Inadequate Attention to Program Details 501
Vulnerability: Protocol Weakness 502
Countermeasure: Trust 503
Countermeasure: Identification and Authentication 503
Countermeasure: Cryptography 506
Related Attack: Covert Channel 508
Related Attack: Steganography 517
Conclusion 519
Exercises 520
Chapter 13: Not All Is as It Seems 524
Attacks: Forgeries 525
Threat: Integrity Failure 530
Attack Details 530
Vulnerability: Protocol Weaknesses 542
Vulnerability: Code Flaws 543
Vulnerability: Humans 543
Countermeasure: Digital Signature 545
Countermeasure: Secure Protocols 566
Countermeasure: Access Control 566
Countermeasure: User Education 568
Possible Countermeasure: Analysis 569
Non-Countermeasure: Software Goodness Checker 571
Conclusion 572
Exercises 574
Chapter 14: Play It [Again] Sam, or, Let’s Look at the Instant Replay 576
Attack: Cloned RFIDs 577
Threat: Replay Attacks 578
Vulnerability: Reuse of Session Data 580
Countermeasure: Unrepeatable Protocol 580
Countermeasure: Cryptography 583
Conclusion: Replay Attacks 584
Similar Attack: Session Hijack 584
Vulnerability: Electronic Impersonation 588
Vulnerability: Nonsecret Token 588
Countermeasure: Encryption 589
Countermeasure: IPsec 593
Countermeasure: Design 596
Conclusion 597
Exercises 598
Chapter 15: I Can’t Get No Satisfaction 600
Attack: Massive Estonian Web Failure 601
Threat: Denial of Service 602
Threat: Flooding 602
Threat: Blocked Access 603
Threat: Access Failure 604
Case: Beth Israel Deaconess Hospital Systems Down 605
Vulnerability: Insufficient Resources 606
Vulnerability: Addressee Cannot Be Found 611
Vulnerability: Exploitation of Known Vulnerability 613
Vulnerability: Physical Disconnection 613
Countermeasure: Network Monitoring and Administration 614
Countermeasure: Intrusion Detection and Prevention Systems 618
Countermeasure: Management 630
Conclusion: Denial of Service 633
Extended Attack: E Pluribus Contra Unum 635
Technical Details 638
Recurring Thread: Legal—DDoS Crime Does Not Pay 643
Vulnerability: Previously Described Attacks 643
Countermeasures: Preventing Bot Conscription 645
Countermeasures: Handling an Attack Under Way 647
Conclusion: Distributed Denial of Service 648
Exercises 649
Interlude C: Cyber Warfare 652
What Is Cyber Warfare? 653
Examples of Cyber Warfare 654
Critical Issues 656
Chapter 16: ’Twas Brillig, and the Slithy Toves . . .  662
Attack: Grade Inflation 663
Threat: Data Corruption 664
Countermeasure: Codes 667
Countermeasure: Protocols 668
Countermeasure: Procedures 669
Countermeasure: Cryptography 670
Conclusion 673
Exercises 674
Chapter 17: Peering through the Window 676
Attack: Sharing Too Much 677
Attack Details: Characteristics of Peer-to-Peer Networks 677
Threat: Inappropriate Data Disclosure 680
Threat: Introduction of Malicious Software 681
Threat: Exposure to Unauthorized Access 682
Vulnerability: User Failure to Employ Access Controls 683
Vulnerability: Unsafe User Interface 683
Vulnerability: Malicious Downloaded Software 684
Countermeasure: User Education 685
Countermeasure: Secure-by-Default Software 685
Countermeasure: Legal Action 686
Countermeasure: Outbound Firewall or Guard 688
Conclusion 689
Recurring Thread: Legal—Protecting Computer Objects 691
Exercises 704
Chapter 18: My 100,000 Nearest and Dearest Friends 706
Attack: I See U 707
Threat: Loss of Confidentiality 708
Threat: Data Leakage 709
Threat: Introduction of Malicious Code 710
Attack Details: Unintended Disclosure 711
Vulnerability: Exploiting Trust Relationships 721
Vulnerability: Analysis on Data 722
Vulnerability: Hidden Data Attributes 722
Countermeasure: Data Suppression and Modification 724
Countermeasure: User Awareness and Education 729
Countermeasure: Policy 733
Conclusion 734
Exercises 736
Afterword 738
Challenges Facing Us 739
Critical Issues 741
Moving Forward: Suggested Next Steps for Improving Computer Security 742
And Now for Something a Little Different 746
Bibliography 749
Index 773.  In this book, the authors of the 20-year best-selling classic Security in Computing take a fresh, contemporary, and powerfully relevant new approach to introducing computer security. Organized around attacks and mitigations, the Pfleegers&amp;apos; new Analyzing Computer Security will attract students&amp;apos; attention by building on the high-profile security failures they may have already encountered in the popular media. Each section starts with an attack description. Next, the authors explain the vulnerabilities that have allowed this attack to occur. With this foundation in place, they systematically present today&amp;apos;s most effective countermeasures for blocking or weakening the attack. One step at a time, students progress from attack/problem/harm to solution/protection/mitigation, building the powerful real-world problem solving skills they need to succeed as information security professionals. Analyzing Computer Security addresses crucial contemporary computer security themes throughout, including effective security management and risk analysis; economics and quantitative study; privacy, ethics, and laws; and the use of overlapping controls. The authors also present significant new material on computer forensics, insiders, human factors, and trust. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2014&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>University physics. Extended version with modern physics /</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=University physics. Extended version with modern physics /&amp;LibraryID=All</link>
      <author>Young, Hugh D.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=University physics. Extended version with modern physics /&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI81722.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Includes index.   This edition, co-authored by Roger Freedman and Hugh Young, reflects the findings of current research in physics education, while adhering to the highest standards of rigorous, yet accessible content coverage, and pedagogical effectiveness. Goals of this revision include helping students develop physical intuition, and building strong problem-solving skills. Two decades of research on the conceptual pitfalls that commonly plague beginning physics students are reflected in this work. A key focus of the Ninth Edition is to discuss the correct way to analyze a situation or solve a problem, as well as why the wrong way (which may occur to a student first) is indeed wrong. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:1996&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Microelectronic Circuits.</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Microelectronic Circuits.&amp;LibraryID=All</link>
      <author>Sedra, Adel S.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Microelectronic Circuits.&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI3729.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Original.    &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:1990&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Digital control of electrical drives</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Digital control of electrical drives&amp;LibraryID=All</link>
      <author>Vukosavić, Slobodan N.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Digital control of electrical drives&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI48690.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;     Digital Control of Electrical Drives offers insight into electric drives and their usage in motion control environment. It provides links among electrical machine and control theory, practical hardware aspects, programming issues, and application-specific problems. The book prepares the reader to understand the key elements of motion control systems, analyze and design discrete-time speed and position controllers, set adjustable feedback parameters, and evaluate closed-loop performances. Basic engineering principles are used to derive the controller structure in an intuitive manner, so that designs are easy to comprehend, modify, and extend.

Digital Control of Electrical Drives helps the reader acquire practical skills in designing discrete-time speed and position controllers. Each chapter is followed by a set of Matlab® and Simulink® tools which help readers master the phases of design, tuning, simulation, and evaluation of discrete time controllers, and foresee the effects of control solution on the overall motion control system. Readers will also understand the present performance limits of digital motion controllers. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2007&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Pakistan Economic Survey 2023-24   : Statistical Supplement</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Pakistan Economic Survey 2023-24   : Statistical Supplement&amp;LibraryID=All</link>
      <author>Pakistan Economic Survey.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Pakistan Economic Survey 2023-24   : Statistical Supplement&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI108596.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;   GROWTH AND INVESTMENT, AGRICULTURE, MANUFACTURING &amp;amp; MINING, FISCAL DEVELOPMENT, MONEY &amp;amp; CREDIT, CAPITAL MARKETS, INFLATION, TRADE &amp;amp; PAYMENTS, PUBLIC DEBT, EDUCATION, HEALTH, POPULATION, LABOUR FORCE AND EMPLOYMENT, TRANSPORT &amp;amp; COMMUNICATIONS, ENERGY and WEIGHTS &amp;amp; MEASURES  Statistical Supplement is an important and essential follow-up document of Pakistan Economic Survey that consolidates socio-economic data for the entire fiscal year, offering a structured and insightful resource for understanding Pakistan’s economic landscape. This document is designed to provide a holistic view of key economic trends, for a diverse range of users, including policymakers, researchers, academia, and other stakeholders. The Supplement aims to serve as a comprehensive reference, enabling users to evaluate sectoral performance, assess policy impacts, and identify evolving economic patterns. The Economic Adviser’s Wing has made concerted efforts to ensure the accuracy and relevance of the data presented in this Supplement. To enhance accessibility, a digital version of the document is available on the Finance Division’s official website. I extend my sincere appreciation to all the Ministries, Divisions, Departments, and Organizations that contributed data to make this publication possible. Their prompt and efficient collaboration has been invaluable. Special thanks are owed to the officers and staff of the Economic Adviser’s 
Wing for their steadfast commitment and effort in producing this document as per schedule. I am indebted to the Minister for Finance &amp;amp; Revenue Mr. Muhammad Aurangzeb, the Minister of State for Finance, Revenue &amp;amp; Power Mr. Ali Pervaiz Malik, and the Finance Secretary Mr. Imdad Ullah Bosal for their guidance and support throughout the process. Continuous engagements, discussions and advice from the senior officers of Finance Division especially Ms. Nasheeta Maryam Mohsin, Mr. Mohammad Hassan Iqbal, Mr. Qumar Sarwar Abbasi, Mr. Iftikhar Amjad, Ms. Saira Najeeb Ahmed, Mr. Amjad Mahmood and Mr. Mohsin Mushtaq Chandna have helped a lot in improving the document which I sincerely acknowledge.Feedback from users plays a vital role in our commitment to continuous improvement. Constructive suggestions to further refine future editions of the Statistical Supplement are always welcomed. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2023&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Pakistan economic survey 2024-25</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Pakistan economic survey 2024-25&amp;LibraryID=All</link>
      <author>Pakistan Finance Division Government of Pakistan.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Pakistan economic survey 2024-25&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI111761.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;   Key Highlights:
GDP Growth:
The economy grew by 2.68%, with the services sector expanding by 2.91%, agriculture by 0.56%, and the industrial sector by 4.77%. 
Economic Size:
The size of the economy reached US$ 411.0 billion in FY2024- 25, while per capita income was $1,824. 
Inflation:
CPI inflation decreased to 4.7% during July-April FY2025, a substantial drop from 26.0% in the same period last year. 
Fiscal Surplus:
Pakistan achieved a fiscal surplus in the first quarter (July-September) of FY25, the first in 24 years. 
Primary Surplus:
A historic primary surplus of 3.0% of GDP was achieved for July-March FY25. 
Investment:
The investment-to-GDP ratio improved to 13.8% in FY25, up from 13.1% in the previous year. 
KSE-100 Index:
The KSE-100 index saw a significant growth of 50.2% during July-March FY25. 
Missed Targets:
The survey acknowledged that key components of the economy missed their targets, with major crops experiencing a 13.5% contraction. 
Structural Reforms:
The survey emphasized the importance of structural reforms in transforming the Pakistani economy, supported by the Extended Fund Facility (EFF) program with the International Monetary Fund (IMF). 
Budget:
The federal budget for FY25 was presented with a total outlay of Rs18.877 trillion, with proposed new taxes of Rs2,000 billion.  The Pakistan Economic Survey 2024-25, released ahead of the annual budget, highlights a GDP growth of 2.68% for the fiscal year, falling short of the initial 3.6% target. The survey also reveals a primary surplus of 3.0% of GDP for July-March FY25, a significant improvement, and a decrease in the Consumer Price Index (CPI) inflation to 4.7% during July-April FY25. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2024&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Management</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Management&amp;LibraryID=All</link>
      <author>Robbins, Stephen P.,</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Management&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI98708.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;     Management 15th Edition by Stephen P. Robbins and Mary A. Coulter This ISBN 9781292215839 is Textbook only. It will not come with online access code. MyLab Online Access code (if required by your instructor ) sold separately at other ISBN Global edition has the same title, same author, same edition but different in product cover page. For undergraduate Principles of Management courses. REAL managers, REAL experiences With a renewed focus on skills and careers, the new edition of this bestselling text can help better prepare your students to enter the job market. Management, 14th Edition, Global Edition, vividly illustrates effective management theories by incorporating the perspectives of real-life managers. Through examples, cases, and hands-on exercises, students will see and experience management in action, helping them understand how the concepts they&amp;apos;re learning actually work in today&amp;apos;s dynamic business world.
&amp;quot;synopsis&amp;quot; may belong to another edition of this title. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2021&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Deep learning</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Deep learning&amp;LibraryID=All</link>
      <author>Kelleher, John D., 1974-,</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Deep learning&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI91685.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;     &amp;quot;Artificial Intelligence is a disruptive technology across business and society. There are three long-term trends driving this AI revolution: the emergence of Big Data, the creation of cheaper and more powerful computers, and development of better algorithms for processing an learning from data. Deep learning is the subfield of Artificial Intelligence that focuses on creating large neural network models that are capable of making accurate data driven decisions. Modern neural networks are the most powerful computational models we have for analyzing massive and complex datasets, and consequently deep learning is ideally suited to take advantage of the rapid growth in Big Data and computational power. In the last ten years, deep learning has become the fundamental technology in computer vision systems, speech recognition on mobile phones, information retrieval systems, machine translation, game AI, and self-driving cars. It is set to have a massive impact in healthcare, finance, and smart cities over the next years. This book is designed to give an accessible and concise, but also comprehensive, introduction to the field of Deep Learning. The book explains what deep learning is, how the field has developed, what deep learning can do, and also discusses how the field is likely to develop in the next 10 years. Along the way, the most important neural network architectures are described, including autoencoders, recurrent neural networks, long short-term memory networks, convolutional networks, and more recent developments such as Generative Adversarial Networks, transformer networks, and capsule networks. The book also covers the two more important algorithms for training a neural network, the gradient descent algorithm and Backpropagation&amp;quot;-- &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2019&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Nonlinear PDEs : a dynamical systems approach</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Nonlinear PDEs : a dynamical systems approach&amp;LibraryID=All</link>
      <author>Schneider, Guido, 1964-</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Nonlinear PDEs : a dynamical systems approach&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI91704.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;     This is an introductory textbook about nonlinear dynamics of PDEs, with a focus on problems over unbounded domains and modulation equations. The presentation is example-oriented, and new mathematical tools are developed step by step, giving insight into some important classes of nonlinear PDEs and nonlinear dynamics phenomena which may occur in PDEs.The book consists of four parts. Parts I and II are introductions to finite- and infinite-dimensional dynamics defined by ODEs and by PDEs over bounded domains, respectively, including the basics of bifurcation and attractor theory. Part III introduces PDEs on the real line, including the Korteweg-de Vries equation, the Nonlinear Schrodinger equation and the Ginzburg-Landau equation. These examples often occur as simplest possible models, namely as amplitude or modulation equations, for some real world phenomena such as nonlinear waves and pattern formation. Part IV explores in more detail the connections between such complicated physical systems and the reduced models. For many models, a mathematically rigorous justification by approximation results is given.The parts of the book are kept as self-contained as possible. The book is suitable for self-study, and there are various possibilities to build one- or two-semester courses from the book. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2017&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Broadband Communications, Networks, and Systems : 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11-12, 2020, Proceedings</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Broadband Communications, Networks, and Systems : 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11-12, 2020, Proceedings&amp;LibraryID=All</link>
      <author>EAI international Conference 2020 ;,</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Broadband Communications, Networks, and Systems : 11th EAI International Conference, BROADNETS 2020, Qingdao, China, December 11-12, 2020, Proceedings&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI96382.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;   Wireless Network and Security -- Possibility of using existed WLAN infrastructure as an emergency network for air-to-ground transmissions: the case of WebRTC-based flying IoT system -- Constructing a Green MPTCP Framework for Industrial Internet of Things Applications -- Identification of Significant Permissions for Efficient Android Malware Detection -- Energy efficiency optimization for RF energy harvesting relay system -- Communication Quality -- Analysis of QoS schemes and shaping strategies for large scale IP networks based on Network Calculus -- Research on information transmission characteristics of two-layer communication network -- Detection of Malicious Android Applications: Classical Machine Learning vs. Deep Neural Network Integrated with Clustering -- Go2Edge - Edge Computing Networks, Systems and Services -- Experimental Evaluation of RSA Algorithms for SDN programmable VCSEL-based S-BVT in High-Capacity and Cost-Efficient Optical Metro Networks -- Implementing a blockchain-based security system applied to IoT -- Joint Core and Spectrum Allocation in Dynamic Optical Networks with ROADMs with no Line Changes -- Comparison of efficient planning and optimization methods of last mile delivery resources -- Decision Making under Uncertainty for the deployment of future networks in IoT Scenarios -- An initial approach to a Multi-Access Edge Computing reference architecture implementation using Kubernetes.  This book constitutes the refereed post-conference proceedings of the 11th International Conference on Broadband Communications, Networks, and Systems, Broadnets 2020, which took place in Qingdao, China, in December 2020. The 13 full papers presented were carefully reviewed and selected from 32 submissions. The papers are thematically grouped as a session on wireless network and security and a session on communication quality. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2021&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Random data  : analysis and measurement procedures</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Random data  : analysis and measurement procedures&amp;LibraryID=All</link>
      <author>Bendat, Julius S</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Random data  : analysis and measurement procedures&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI82347.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  &amp;quot;A Wiley-Interscience publication.&amp;quot;   &amp;quot;First published in 1971, Random Data served as an authoritative book on the analysis of experimental physical data for engineering and scientific applications. This Fourth Edition features coverage of new developments in random data management and analysis procedures that are applicable to a broad range of applied fields, from the aerospace and automotive industries to oceanographic and biomedical research.&amp;quot; &amp;quot;This new edition continues to maintain a balance of classic theory and novel techniques. The authors expand on the treatment of random data analysis theory, including derivations of key relationships in probability and random process theory. The book remains unique in its practical treatment of nonstationary data analysis and nonlinear system analysis, presenting the latest techniques on modern data acquisition, storage, conversion, and qualification of random data prior to its digital analysis.&amp;quot;--BOOK JACKET.&#xD;
&amp;quot;First published in 1971, Random Data served as an authoritative book on the analysis of experimental physical data for engineering and scientific applications. This Fourth Edition features coverage of new developments in random data management and analysis procedures that are applicable to a broad range of applied fields, from the aerospace and automotive industries to oceanographic and biomedical research.&amp;quot; &amp;quot;This new edition continues to maintain a balance of classic theory and novel techniques. The authors expand on the treatment of random data analysis theory, including derivations of key relationships in probability and random process theory. The book remains unique in its practical treatment of nonstationary data analysis and nonlinear system analysis, presenting the latest techniques on modern data acquisition, storage, conversion, and qualification of random data prior to its digital analysis.&amp;quot;--BOOK JACKET. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2010&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Biostatistics  : a foundation for analysis in the health sciences</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Biostatistics  : a foundation for analysis in the health sciences&amp;LibraryID=All</link>
      <author>Daniel, Wayne W.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Biostatistics  : a foundation for analysis in the health sciences&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI81903.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Comprend un index.   Like its predecessors, this edition stresses intuitive understanding of principles rather than learning by mathematical proof. Provides broad coverage of statistical procedures used in all the health science disciplines. This version contains a greater emphasis on computer applications, and most of the statistical techniques include the MINITAB commands by which they can be applied. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:1999&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers&amp;LibraryID=All</link>
      <author>IWDW (Conference) 2021 :,</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Digital forensics and watermarking : 20th international workshop, IWDW 2021, Beijing, China, November 20-22, 2021 : revised selected papers&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI111685.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  International conference proceedings.&#xD;
Includes author index. Forensics and Security Analysis -- A Multi-Level Feature Enhancement Network for Image Splicing Localization -- MSA-CNN: Face Morphing Detection via a Multiple Scales Attention Convolutional Neural Network -- Double-Stream Segmentation Network with Temporal Self-Attention for Deepfake Video Detection -- Exposing Deepfake Videos with Spatial, Frequency and Multi-Scale Temporal Artifacts -- On the Security of Encrypted JPEG Image with Adaptive Key Generated by Invariant Characteristic -- Modify the Quantization Table in the JPEG Header File for Forensics and Anti-Forensics -- More Accurate and Robust PRNU-Based Source Camera Identification with 3-Step 3-Class Approach -- Effects of Image Compression on Image Age Approximation -- FMFCC-A: A Challenging Mandarin Dataset for Synthetic Speech Detection -- Watermarking -- A Feature-Map-Based Large-Payload DNN Watermarking Algorithm -- A Robust DCT-Based Video Watermarking Scheme Against Recompression and Synchronization Attacks -- Improved Fluctuation Derived Block Selection Strategy in Pixel Value Ordering Based Reversible Data Hiding -- MasterFace Watermarking for IPR Protection of Siamese Network for Face Verification -- Steganology -- Arbitrary-Sized JPEG Steganalysis Based on Fully Convolutional Network -- Using Contrastive Learning to Improve the Performance of Steganalysis Schemes -- A HEVC Steganalysis Algorithm Based on Relationship of Adjacent Intra Prediction Modes -- Data Hiding Based on Redundant Space of WeChat Mini Program Codes -- Image Block Regression Based on Feature Fusion for CNN-Based Spatial Steganalysis.  This volume constitutes the proceedings of the 20th International Workshop on Digital Forensics and Watermarking, IWDW 2021, held in Beijing, China, in November 2021. The 18 full papers in this volume were carefully reviewed and selected from 32 submissions. The are categorized in the following topical headings: Forensics and Security Analysis; Watermarking and Steganology. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2022&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Schaum&amp;apos;s outline of theory and problems of programming with structured COBOL</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Schaum&amp;apos;s outline of theory and problems of programming with structured COBOL&amp;LibraryID=All</link>
      <author>Newcomer, Larry R.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Schaum&amp;apos;s outline of theory and problems of programming with structured COBOL&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI81850.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Spine title: Programming with structured COBOL.&#xD;
Includes index.    &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:1984&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Risk management and financial institutions</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Risk management and financial institutions&amp;LibraryID=All</link>
      <author>Hull, John.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Risk management and financial institutions&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI88605.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Previous edition: 2012.    &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2007&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Schaum&amp;apos;s outline of theory and problems of basic electrical engineering</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Schaum&amp;apos;s outline of theory and problems of basic electrical engineering&amp;LibraryID=All</link>
      <author>Cathey, Jimmie J.</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Schaum&amp;apos;s outline of theory and problems of basic electrical engineering&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI64648.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Includes index.   Students will quickly understand the popularity of this helpful sourcebook--the first edition sold 46,000 copies! The chief emphasis is on solving realistic problems, hundreds of which are included with detailed solutions. This popular study guide concisely yet clearly covers all the areas taught in two-semester survey courses and serves as an ideal review for electrical engineers and others looking for high ratings on the Professional Engineer&amp;apos;s Examination. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:1997&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
    <item>
      <title>Data communications and networking</title>
      <link>https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Data communications and networking&amp;LibraryID=All</link>
      <author>Forouzan, Behrouz A</author>
      <description>&#xD;
&lt;table&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;a href='https://nu.insigniails.com/Library/Index?SearchType=titles&amp;PassedInValue=Data communications and networking&amp;LibraryID=All'&gt;&#xD;
			&lt;img src='https://nu.insigniails.com/Library/images/~imageCI32883.JPG' alt='Cover Image' width='80' height='110' border='0'&gt;&#xD;
		&lt;/a&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;  Includes index. Overview of Data Communications and Networking -- Introduction -- Protocol Stack and Network Models -- Physical Layer -- Signals -- Digital Transmission -- Analog Transmission -- Multiplexing -- Transmission Media -- Circuit Switching and Telephone Network -- High-Speed Digital Access: DSL, Cable Modems, and SONET -- Data Link Layer -- Error Detection and Correction -- Data Link Control and Protocols -- Point-to-Point Access: PPP -- Multiple Access -- Local Area Networks: Ethernet -- Wireless LANs -- Connecting LANs, Backbone Networks, and Virtual LANs -- Cellular Telephone and Satellite Networks -- Virtual Circuit Switching: Frame Relay and ATM -- Network Layer -- Host-to-Host Delivery: Internetworking, Addressing, and Routing -- Network Layer Protocols: ARP, IPv4, ICMP, IPv6, and ICMPv6 -- Unicast and Multicast Routing: Routing Protocols -- Transport Layer -- Process-to-Process Delivery: UDP and TCP -- Congestion Control and Quality of Service -- Application Layer -- Client-Server Model: Socket Interface -- Domain Name System (DNS) -- Electronic Mail (SMTP) and File Transfer (FTP) -- HTTP and WWW -- Multimedia -- Security -- Cryptography -- Message Security, User Authentication, and Key Management -- Security Protocols in the Internet.  Data Communications and Networking is designed to help students understand the basics of data communications and networking, and the protocols used in the Internet in particular by using the protocol layering of the Internet and TCP/IP protocol suite. Technologies related to data communication and networking may be the fastest growing in today&amp;apos;s culture. The appearance of some new social networking applications is a testimony to this claim. In this Internet-oriented society, specialists need to be trained to run and manage the Internet, part of the Internet, or an organization&amp;apos;s network that is connected to the Internet. As both the number and types of students are increasing, it is essential to have a textbook that provides coverage of the latest advances, while presenting the material in a way that is accessible to students with little or no background in the field.

Using a bottom-up approach, Data Communications and Networking presents this highly technical subject matter without relying on complex formulas by using a strong pedagogical approach supported by more than 830 figures. Now in its Fifth Edition, this textbook brings the beginning student right to the forefront of the latest advances in the field, while presenting the fundamentals in a clear, straightforward manner. Students will find better coverage, improved figures and better explanations on cutting-edge material. The &amp;quot;bottom-up&amp;quot; approach allows instructors to cover the material in one course, rather than having separate courses on data communications and networking. &lt;/p&gt;&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;tr&gt;&#xD;
	&lt;td&gt;&#xD;
		&lt;p&gt;Date Published:2004&lt;/p&gt;	&#xD;
	&lt;/td&gt;&#xD;
&lt;/tr&gt;&#xD;
&lt;/table&gt;</description>
    </item>
  </channel>
</rss>