Electronic Books

Total Books: 8561 - 8580 /11894
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Weiterlesen
Privacy Preserving Data Mining

Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns ...

Weiterlesen
Privacy and Data Protection in Software Services

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...

Weiterlesen
Privacy and Technologies of Identity

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...

Weiterlesen
Privacy in Statistical Databases

Privacy in statistical databases is a discipline whose purpose is to provide - lutions to the con?ict between the increasing ...

Weiterlesen
Privacy in Statistical Databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings

Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...

Weiterlesen
Privacy, Security and Trust within the Context of Pervasive Computing

Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the ...

Weiterlesen
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

Weiterlesen
Privacy-Preserving Data Mining:Models and Algorithms

Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...

Weiterlesen
Privacy-Respecting Intrusion Detection

With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...

Weiterlesen
Private Equity Exits

Examining the efficiency of exits, this book offers recommendations and guidelines for an integrated and exit-oriented private ...

Weiterlesen
Private Military and Security Companies

The present collection of contributions to this topic by distinct experts in the field is unique as it covers most, if not ...

Weiterlesen
Pro C# 2008 and the .NET 3.5 Platform

.NET 3.0 was more of an augmentative release, essentially providing three new APIs: Windows Presentation Foundation (WPF), ...

Weiterlesen
Pro Java EE 5 Performance Management and Optimization

Pro Java EE 5 Performance Management and Optimization features proven methodology to guarantee top-performing Java EE 5 applications, ...

Weiterlesen
Pro Oracle Application Express

Application Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...

Weiterlesen
Pro PerformancePoint Server 2007 : Building Business Intelligence Solutions

Pro PerformancePoint Server 2007 is Microsoft's latest product in its line of business intelligence applications, a piece ...

Weiterlesen
Pro Spring 2.5

The move from so–called heavyweight architectures, such as Enterprise JavaBeans, toward lightweight frameworks, like Spring, ...

Weiterlesen
Pro T-SQL 2008 Programmers Guide

Discussing new and existing features, SQL Server designer and administrator Michael Coles takes you on an expert guided tour ...

Weiterlesen
Pro TBB : C++ Parallel Programming with Threading Building Blocks

This book is a modern guide for all C++ programmers to learn Intel Threading Building Blocks (TBB).this book reflects their ...

Weiterlesen
Pro VB 2008 and the .NET 3.5 Platform

The point of this chapter was to demystify the garbage collection process. As you have seen, the garbage collector will only ...

Weiterlesen
Total Books: 8561 - 8580 /11894