This book constitutes the refereed proceedings of the Third International Conference on Autonomic and Trusted Computing, ...
اقرأ المزيدThis book constitutes the refereed procedings of the 5th International Conference on Autonomic and Trusted Computing, ATC ...
اقرأ المزيدMAS offiers powerful metaphors for information system conceptualization, a range of new techniques, and technologies specifically ...
اقرأ المزيدMAS offiers powerful metaphors for information system conceptualization, a range of new techniques, and technologies specifically ...
اقرأ المزيدIf you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability ...
اقرأ المزيدThe book begins by discussing the background of Linux and open source software, then proceeds to guide you through the SUSE ...
اقرأ المزيدYou love it as the world's most popular desktop Linux distribution, and now Ubuntu is available at a server near you. Embracing ...
اقرأ المزيدThis book features various studies on democratization, transformation, socio-economic development, and security issues in ...
اقرأ المزيدCombines experimental and theoretical research on big data recommender systems to help computer scientists develop new concepts ...
اقرأ المزيدCombines experimental and theoretical research on big data recommender systems to help computer scientists develop new concepts ...
اقرأ المزيدThis book constitutes the proceedings of the 9th International Conference on Big Data, BigData 2020, held as part of SCF ...
اقرأ المزيدCovers analytical techniques for handling the huge amount of data generated by the Internet of Things, from architectures ...
اقرأ المزيدThe main theme of this book is the relation between the global structure of Banach spaces and the various types of generalized ...
اقرأ المزيدThis book constitutes the refereed proceedings of the International Workshop on Biosurveillance and Biosecurity, BioSecure ...
اقرأ المزيدAims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...
اقرأ المزيدBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
اقرأ المزيدBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
اقرأ المزيدFor cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security ...
اقرأ المزيدThis volume covers research trends as well as current achievements and cutting-edge developments in the area of modern business ...
اقرأ المزيدThis volume covers research trends as well as current achievements and cutting-edge developments in the area of modern business ...
اقرأ المزيد