Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيدWith our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
اقرأ المزيدPro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the ...
اقرأ المزيدAuthor Sander van Vugt comprehensively covers this server product, and takes you through all of the necessary setup stages ...
اقرأ المزيدApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
اقرأ المزيدPro Service-Oriented Smart Clients with .NET 2.0 demonstrates how Smart Clients satisfy multiple purposes. First, you deploy ...
اقرأ المزيدPro WF: Windows Workflow in .NET 3.0 provides you with the skills you need to incorporate WF into your applications. This ...
اقرأ المزيدThe main focus of Pro Web 2.0 Application Development with GWT is an analysis of a full-fledged Web 2.0 application called ...
اقرأ المزيدInside this book, you'll find everything you need to know about managing SBS 2003 on a daily basis. Author Tony Campbell ...
اقرأ المزيدThe major characteristic pathological findings of pulmonary vascular remodelling are increased wall thickening of pulmonary ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThe significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...
اقرأ المزيدThis book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th Asian Symposium on Programming Languages and Systems, APLAS 2007, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 16th European Symposium on Programming, ESOP 2007, held in Braga, Portugal ...
اقرأ المزيدConstitutes the refereed proceedings of the Third Asian Symposium on Programming Languages and Systems, APLAS 2005, held ...
اقرأ المزيدThis volume contains the proceedings of the ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory ...
اقرأ المزيدThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
اقرأ المزيدThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
اقرأ المزيد