A practical, comprehensive resource for commercial interior design Designing Commercial Interiors is the industry standard ...
WeiterlesenThe book brings in diverse perspectives on ubiquitous information environments, from computer-supported collaborative work, ...
WeiterlesenIt including: Methods of detection of Improvised Explosives (IE). Methods of detection of Improvised explosives devices (IED). ...
WeiterlesenThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThis book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThe organization of an Advanced Research Workshop with the title “Detection and Disposal of Liquid Explosives and Flammable ...
WeiterlesenExplore software lifecycle best practices Use DevSecOps methodologies to facilitate software development and delivery Understand ...
WeiterlesenAs Ambient Intelligence (AmI) ecosystems are rapidly becoming a reality, they raise new research challenges. Unlike predefined ...
WeiterlesenThe research papers included in the AmI.d proceedings are devoted to both theoretical and applied research, cover the most ...
WeiterlesenOur project is a distributed medical system that is used by patients and multiple medical sectors such as doctors, pharmacists, ...
WeiterlesenThis study is about developing a secure, autoscaling military postponement e-service in Syria, that allows Syrian citizens ...
WeiterlesenThis book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.
WeiterlesenIn Digital Finance: Security Tokens and Unlocking the Real Potential Blockchain, readers will realize why security tokens ...
WeiterlesenIf you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...
WeiterlesenNew information technologies are being applied swiftly to all levels of government service: local, county, regional and even ...
WeiterlesenConstitutes the proceedings of the 8th International Conference on Asian Digital Libraries, ICADL 2005. This book is organized ...
WeiterlesenThe International Conference on Asian Digital Libraries (ICADL) is an annual international forum that provides opportunities ...
Weiterlesen