![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Open AccessThe macroscopic limit to synchronization of cellular clocks in single cells of Neurospora crassa
We determined the macroscopic limit for phase synchronization of cellular clocks in an artificial tissue created by a “big chamber” microfluidic device to be about 150,000 cells or less. The dimensions of the ...
-
Article
Existence and continuous dependence of mild solutions for impulsive fractional integrodifferential equations in Banach spaces
In the present paper, we investigate the existence, uniqueness, and continuous dependence of mild solutions of impulsive neutral integrodifferential equations with nonlocal conditions in Banach spaces. We use ...
-
Chapter
Erratum
-
Chapter
Mobile Forensics
This chapter covers the forensic process with mobile devices. The forensics will explore the call history, mobile browser, and types of devices. The exercises will focus on the operating systems, device states...
-
Chapter
Web and Database Security
Security in web applications is the most important concern when it comes to processing transactions in the web. One of the major issues is the security and privacy of data and information transferred, stored a...
-
Chapter
Web Forensics-Chapter Competencies
This chapter covers web forensic procedures commonly used by digital forensics professionals. The focus of the is on email communications, web browsing, and archived transmissions. The chapter explores the p...
-
Chapter
Network Security
Providing appropriate protection techniques is significant to combat cyber-threats and preserve the integrity, confidentiality and availability of computer networks. The increasing volume of malicious cyber-at...
-
Chapter
Network Forensics: Lesson Plans
A forensic investigator who is analyzing computer equipment for possible evidences, will search different locations for possible traces. We described in other chapters the types of evidences that can be found ...
-
Chapter
Introduction to Information Security
Nowadays, security is becoming number one priority for governments, organization, companies, and individuals. Security is all about protecting critical and valuable assets. Protecting valuable and critical ass...
-
Chapter
Security and Access Controls: Lesson Plans
Access controls are considered as important security mechanisms. They usually target (authenticated users: Those users who can legally access subject information system or resource). This indicates that they t...
-
Chapter
Encryption and Information Protection/Integrity and Concealment Methods: Lesson Plans
Information protection is a key goal to most of information security controls. Without information hiding and protection mechanisms the whole e-commerce and remote communication mechanisms will not be possible...
-
Chapter
Software Code Security: Lesson Plans
In information systems, software programs are major components that exist to implement services/functions. They integrate hardware, network and environment to provide services for users that can vary based on ...
-
Chapter
Disk and Computer Forensics: Lesson Plans
In , many software and hardware components can be searched for possible relevant evidences. Digital forensic investigators should not only have knowledge on the subject case, but also on technical skills rela...
-
Chapter
The Ontology of Malwares
Absolute security is almost impossible. On a daily basis the security of many systems is compromised. Attackers utilize different techniques to threaten systems’ security. Among different threats to systems’ s...
-
Chapter
Security and Risk Management and Planning: Lesson Plans
This chapter covers risk management and planning associated with information security. The focus is on incident responses, disaster recovery, and business continuity. The chapter explains risks, strategies, co...
-
Chapter
Mobile and Wireless Security: Lesson Plans
Mobile and wireless by humans continue to grow rapidly in the last few years. Number of subscribers to mobile service provides exceed the number of human population (As in many cases, users carry more tha...
-
Article
Open AccessSynchronizing stochastic circadian oscillators in single cells of Neurospora crassa
The synchronization of stochastic coupled oscillators is a central problem in physics and an emerging problem in biology, particularly in the context of circadian rhythms. Most measurements on the biological c...
-
Article
A unified theory of contra-(μ,λ)-continuous functions in generalized topological spaces
We introduce a new notion called contra-(μ,λ)-continuous functions as functions on generalized topological spaces [8]. We obtain some characterizations and several properties of such functions. The functions enab...
-
Article
A unified theory of generalized closed sets in weak structures
A new kind of sets called generalized w-closed (briefly gw-closed) sets is introduced and studied in a topological space by using the concept of weak structures introduced by Á. Császár in [6]. The class of all g...