You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيد
This two-volume set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيد
This book set constitutes the proceedings of the 26th International Conference on Tools and Algorithms for the Construction ...
اقرأ المزيد
This is Part I: SAT and SMT, SAT solving and theorem proving; verification and analysis; model checking; tool demo; and machine ...
اقرأ المزيد
This is Part II: contiants Tools and Algorithms for the Construction and Analysis of Systems
اقرأ المزيد
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيد
Provides a self-contained presentation of the foundations of finite fields, including a detailed treatment of their algebraic ...
اقرأ المزيد
This book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together ...
اقرأ المزيد
Towards Next Generation Grids is the fifth volume of the CoreGRID series. Organized jointly with the Euro-Par 2007 conference, ...
اقرأ المزيد
This volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...
اقرأ المزيد
Transactions on Computational Science II is devoted to the subject of denotational mathematics for computational intelligence. ...
اقرأ المزيد
The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...
اقرأ المزيد
Transactions on HiPEAC is a new journal which aims at the timely dissemination of research contributions in computer architecture ...
اقرأ المزيد
Topics of interest include model driven architecture, enterprise development environments, service oriented architecture, ...
اقرأ المزيد
What do you do when your database application isn't running fast enough? You troubleshoot, of course. Finding the slow part ...
اقرأ المزيد
Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...
اقرأ المزيد
The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...
اقرأ المزيد
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
اقرأ المزيد
The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...
اقرأ المزيد