Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
اقرأ المزيدDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
اقرأ المزيدThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
اقرأ المزيدThis volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
اقرأ المزيدInformation Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
اقرأ المزيدThis volume, edited by Constantine Stephanidis, contains papers in the thematic area of Universal Access in Human-Computer ...
اقرأ المزيدThis book presents sequential decision theory from a novel algorithmic information theory perspective. While the former is ...
اقرأ المزيدThis book is the first to systematically introduce the principles of urban informatics and its application to every aspect ...
اقرأ المزيدUtilization of Space aims to serve as an authoritative overview for professionals and interested laymen by explaining scientific ...
اقرأ المزيدThis monograph presents a complete computational system for visual attention and object detection: VOCUS (Visual Object detection ...
اقرأ المزيدTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
اقرأ المزيدValuation is a hot topic among life sciences professionals. There is no clear understanding on how to use the different valuation ...
اقرأ المزيدThis book recognizes that there is no consent on how to apply valuation methodologies in life sciences. One of the complicating ...
اقرأ المزيدDaniel Pindur analyzes value creation in successful LBOs on investment level conceptually and empirically from an LBO equity ...
اقرأ المزيدVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
اقرأ المزيدhe primary objective of this book is to offer practical means for strengthening the economics and policy dimension of the ...
اقرأ المزيدMost data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
اقرأ المزيدThis book presents theoretical framework and sample applications of variant construction. The first part includes the components ...
اقرأ المزيدVenture capitalists (VCs) fund ventures with the aim of reaping a capital gain upon exit. Research has identified information ...
اقرأ المزيدVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
اقرأ المزيد