This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيدIT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...
اقرأ المزيدIT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...
اقرأ المزيدThis book provides knowledge for cost savings and business improvement as well as new technical solutions. Composed of over ...
اقرأ المزيدThis book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering ...
اقرأ المزيدThis book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
اقرأ المزيدThis book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...
اقرأ المزيدConstitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...
اقرأ المزيدThe desk reference’s unique graphical approach will take otherwise complex textual descriptions and make the information ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...
اقرأ المزيدThe 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
اقرأ المزيدThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
اقرأ المزيدThis book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
اقرأ المزيدThis volume contains papers presented at the International Conference on Software Process (ICSP 2008) held in Leipzig, Germany, ...
اقرأ المزيد