This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...
اقرأ المزيدMalware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...
اقرأ المزيدDiscusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling ...
اقرأ المزيدAt the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...
اقرأ المزيدThis book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts ...
اقرأ المزيدThe book deals with the management of information systems security and privacy, based on a model that covers technological, ...
اقرأ المزيدThis volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...
اقرأ المزيدThe 48 revised full papers and 30 revised short papers cover management of distributed networks, network configuration and ...
اقرأ المزيدThis edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...
اقرأ المزيدExamine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...
اقرأ المزيدMarket Momentum: It examines the behavioral and statistical causes of market momentum while also exploring the practical ...
اقرأ المزيدBy presenting state-of-the-art results in logical reasoning and formal methods in the context of artificial intelligence ...
اقرأ المزيدThe rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...
اقرأ المزيدThis publication is meant to foster links between groups facing challenges cleaning up contaminated sites through presentations ...
اقرأ المزيدCoherent sources of mid-infrared (mid-IR) radiation are of great interest for a wide range of scienti?c and technological ...
اقرأ المزيدThis second book in a series of three volumes examines the repertoire of policies and programmes led by EU Member States ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...
اقرأ المزيدThis book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to ...
اقرأ المزيدThis book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...
اقرأ المزيد