This volume presents the state of the art concerning quality and interestingness measures for data mining. The book summarizes ...
اقرأ المزيدThis book investigates the effects of changes in leadership and managerial structures of Nordic universities resulting from ...
اقرأ المزيدThis textbook offers a practical guide into research ethics for undergraduate students in the social sciences. A step-by-step ...
اقرأ المزيدThe use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
اقرأ المزيدOrganizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...
اقرأ المزيد"Sinkholes and Subsidence" provides a twenty-first century account of how the various subsidence features in carbonate ...
اقرأ المزيدFrom the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...
اقرأ المزيدThis book provides a comprehensive and informative overview of the current state of research about student perceptions of ...
اقرأ المزيدUntangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...
اقرأ المزيدThis textbook is the first to provide Business and Economics with a precise and intuitive introduction to the formal backgrounds ...
اقرأ المزيدThe call for transformation in critical aspects of the operations of the global construction industry is ever more critical.
اقرأ المزيدThe primary objective of this study is to examine the impact of bank specific characteristics and macroeconomic variables ...
اقرأ المزيدYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيدThe aim of this book is to discuss practically useful (operational) bioindicators for sustainable coastal management, criteria ...
اقرأ المزيدProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
اقرأ المزيدThis book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...
اقرأ المزيدThe book chapters comprehensively and significantly highlight different scientific research disciplines related to wadi flash ...
اقرأ المزيدOffers readers an essential guide to planning, designing, and preserving secure wireless infrastructures. It is a blueprint ...
اقرأ المزيدProvides a summary review of wireless networking, then surveys the security threats unique to the wireless and mobile landscape. ...
اقرأ المزيد