A practical, comprehensive resource for commercial interior design Designing Commercial Interiors is the industry standard ...
Weiterlesen
The book brings in diverse perspectives on ubiquitous information environments, from computer-supported collaborative work, ...
Weiterlesen
It including: Methods of detection of Improvised Explosives (IE). Methods of detection of Improvised explosives devices (IED). ...
Weiterlesen
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Weiterlesen
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
Weiterlesen
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Weiterlesen
This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
Weiterlesen
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
Weiterlesen
The organization of an Advanced Research Workshop with the title “Detection and Disposal of Liquid Explosives and Flammable ...
Weiterlesen
Explore software lifecycle best practices Use DevSecOps methodologies to facilitate software development and delivery Understand ...
Weiterlesen
As Ambient Intelligence (AmI) ecosystems are rapidly becoming a reality, they raise new research challenges. Unlike predefined ...
Weiterlesen
The research papers included in the AmI.d proceedings are devoted to both theoretical and applied research, cover the most ...
WeiterlesenOur project is a distributed medical system that is used by patients and multiple medical sectors such as doctors, pharmacists, ...
WeiterlesenThis study is about developing a secure, autoscaling military postponement e-service in Syria, that allows Syrian citizens ...
Weiterlesen
This book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
Weiterlesen
In Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...
Weiterlesen
If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
Weiterlesen
New information technologies are being applied swiftly to all levels of government service: local, county, regional and even ...
Weiterlesen
Constitutes the proceedings of the 8th International Conference on Asian Digital Libraries, ICADL 2005. This book is organized ...
Weiterlesen
The International Conference on Asian Digital Libraries (ICADL) is an annual international forum that provides opportunities ...
Weiterlesen