This book is a collection of papers presented at UCS 2004, held on November 8-9 in Tokyo. The submitted papers presented ...
اقرأ المزيدThis book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...
اقرأ المزيدThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
اقرأ المزيدProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
اقرأ المزيدDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
اقرأ المزيدCovers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
اقرأ المزيدThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
اقرأ المزيدThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
اقرأ المزيدThis volume explores how UN peace operations are adapting to four trends in the changing global order: the rebalancing of ...
اقرأ المزيدThe book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...
اقرأ المزيدThis is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: ...
اقرأ المزيدfeatures of the programming languages we employ in these programs are plentiful, including object-oriented organizations ...
اقرأ المزيدThe scope of book includes the sharing and interoperability of tools, the alignment of theory and practice, the identification ...
اقرأ المزيدProceedings of the NATO Advanced Research Workshop on Significance of Virus Diseases for Crop Biosecurity in a Developing ...
اقرأ المزيدThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
اقرأ المزيدNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
اقرأ المزيدThis book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...
اقرأ المزيدThis book explores the implications of urbanization in South Asia for water (in-) security in the peri-urban spaces of Dhaka ...
اقرأ المزيدWater is essential for life and the trigger for this book is in the increasing threats to uninterrupted, good quality water ...
اقرأ المزيدThis book focuses on Zope 3, though it also addresses the needs of Zope 2 developers who want to use Zope 3 features as they ...
اقرأ المزيد