Electronic Books

Total Books: 6601 - 6620 /8245
Search Engines, Link Analysis, and Users Web Behavior

This book presents a specific and unified approach framework to three major components: Search Engines Performance, Link ...

Weiterlesen
Seasonal Climate: Forecasting and Managing Risk

Formed around a set of lectures presented at a NATO Advanced Study Institute (ASI), this book has grown in scope and in aspiration ...

Weiterlesen
Second Generation Wavelets and Applications

This book details the mathematical fundamentals of the lifting transform and illustrates the latest applications of the transform ...

Weiterlesen
NoIMG
Secondary Analysis of Electronic Health Records

This book trains the next generation of scientists representing different disciplines to leverage the data generated during ...

Weiterlesen
Secrets of the Old One

In March 1905, at approximately eight week intervals, the Editor of the noted German physics journal, Annalen der Physik, ...

Weiterlesen
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Weiterlesen
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

Weiterlesen
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Weiterlesen
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Weiterlesen
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Weiterlesen
Secure Group Communications Over Data Networks

This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...

Weiterlesen
NoIMG
Secure Mobile Ad-hoc Networks and Sensors

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...

Weiterlesen
Secure Systems Development with UML

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical ...

Weiterlesen
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Weiterlesen
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Weiterlesen
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

Weiterlesen
Security Management, Integrity, and Internal Control in Information Systems

Features proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, ...

Weiterlesen
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Weiterlesen
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

Weiterlesen
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Weiterlesen
Total Books: 6601 - 6620 /8245