Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
اقرأ المزيد
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
اقرأ المزيد
Pro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the ...
اقرأ المزيد
Author Sander van Vugt comprehensively covers this server product, and takes you through all of the necessary setup stages ...
اقرأ المزيد
Application Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
اقرأ المزيد
Pro Service-Oriented Smart Clients with .NET 2.0 demonstrates how Smart Clients satisfy multiple purposes. First, you deploy ...
اقرأ المزيد
Pro WF: Windows Workflow in .NET 3.0 provides you with the skills you need to incorporate WF into your applications. This ...
اقرأ المزيد
The main focus of Pro Web 2.0 Application Development with GWT is an analysis of a full-fledged Web 2.0 application called ...
اقرأ المزيد
Inside this book, you'll find everything you need to know about managing SBS 2003 on a daily basis. Author Tony Campbell ...
اقرأ المزيد
The major characteristic pathological findings of pulmonary vascular remodelling are increased wall thickening of pulmonary ...
اقرأ المزيد
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيد
The significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...
اقرأ المزيد
This book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th Asian Symposium on Programming Languages and Systems, APLAS 2007, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 16th European Symposium on Programming, ESOP 2007, held in Braga, Portugal ...
اقرأ المزيد
Constitutes the refereed proceedings of the Third Asian Symposium on Programming Languages and Systems, APLAS 2005, held ...
اقرأ المزيد
This volume contains the proceedings of the ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory ...
اقرأ المزيد
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
اقرأ المزيد
The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
اقرأ المزيد