This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This book constitutes the proceedings of the 13th International Conference on Smart Homes and Health Telematics, ICOST 2015, held in Geneva, Switzerland, in June 2015. The 20 full papers and 16 short contributions included in this volume were carefully reviewed and selected from 45 submissions. They were organized in topical sections named: design and usability; assistive and sentient enviro…
This book presents an overview of material-specific factors that influence Tc and give rise to diverse Tc values for copper oxides and iron-based high- Tc superconductors on the basis of more than 25 years of experimental data, to most of which the author has made important contributions. The book then explains why both compounds are distinct from others with similar crystal structure and wheth…
This book describes synergetic innovation opportunities offered by combining the field of power conversion with the field of integrated circuit (IC) design. The authors demonstrate how integrating circuits enables increased operation frequency, which can be exploited in power converters to reduce drastically the size of the discrete passive components. The authors introduce multiple power conve…
This book presents a collection of results from the interdisciplinary research project “ELLI” published by researchers at RWTH Aachen University, the TU Dortmund and Ruhr-Universität Bochum between 2011 and 2016. All contributions showcase essential research results, concepts and innovative teaching methods to improve engineering education. Further, they focus on a variety of areas, includ…
In this book, hybrid systems based on yttrium-iron-garnet (YIG), three dimensional microwave cavity resonators, and superconducting transmon qubits, are investigated by continuous wave and pulsed microwave spectroscopy. Limitations to the magnetic linewidth in the quantum regime are identified and coherent exchange between a magnon and a superconducting qubit are demonstrated. Finally, a first …
The Comparative Agendas Project (CAP) brings together data on government activities in over twenty countries, and provides a consistent categorizing system to understand when a given institution of government in a particular country took action on any issue of public policy. All topics are covered, comprehensively, over several decades, in some countries going back to World War II. Because of t…
This book focuses on domain-specific heterogeneous reconfigurable architectures, demonstrating for readers a computing platform which is flexible enough to support multiple standards, multiple modes, and multiple algorithms. The content is multi-disciplinary, covering areas of wireless communication, computing architecture, and circuit design. The platform described provides real-time processin…
This open access book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current technological gap between software management paradigms and cybersecurity models, the latter still lacking orchestration and agility to effectively address the dynamicity of the former. This book provides a comprehensive review of the main concepts, architecture…
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…