“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
اقرأ المزيد
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
اقرأ المزيد
Heterogeneous Wireless Access Networks provides a unified view of the state-of-the-art protocols and architectures for heterogeneous ...
اقرأ المزيد
The 75 revised full papers address all current issues of parallel and distributed systems and high performance computing ...
اقرأ المزيد
Constitutes the refereed proceedings of the First International Conference on High-Performance Computing and Communications, ...
اقرأ المزيد
HPCC has moved into the mainstream of c- puting and has become a key technology in future research and development activities ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 14th International Conference on High-Performance Computing, HiPC 2007, ...
اقرأ المزيد
The ProgramCommittee received a total of 84 submissions; only 17 were selected for presentation as full-length papers and ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
Installing a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...
اقرأ المزيد
Hop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service ...
اقرأ المزيدAt a high level, this project involves building and configuring a hosting server to provide website, email, and FTP hosting ...
اقرأ المزيد
This book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...
اقرأ المزيد
This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
اقرأ المزيد
Human Ear Recognition by Computer is the first book on the automatic recognition of human ears. It presents an entire range ...
اقرأ المزيد
Constitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in ...
اقرأ المزيد
Covers all areas of human–computer interaction and human factors in cybersecurity Includes information for IT specialists, ...
اقرأ المزيد
This book is part of a two-volume work that constitutes the refereed proceedings of the 11th IFIP TC13 International Conference ...
اقرأ المزيد
The 2005 International Conference “Hydrogen Materials Science and Chemistry of Carbon Nanomaterials” (ICHMS’2005) was ...
اقرأ المزيد
Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...
اقرأ المزيد