This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
Modern imaging techniques and computational simulations yield complex multi-valued data that require higher-order mathematical descriptors. This book addresses topics of importance when dealing with such data, including frameworks for image processing, visualization and statistical analysis of higher-order descriptors. It also provides examples of the successful use of higher-order descriptors …