This book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...
WeiterlesenThe book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
WeiterlesenProvides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
WeiterlesenDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
WeiterlesenCovers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...
WeiterlesenThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
WeiterlesenThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
WeiterlesenThis volume explores how UN peace operations are adapting to four trends in the changing global order: the rebalancing of ...
WeiterlesenThe book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...
WeiterlesenThis book examines environmental security from the perspective of landscape sciences, identifying the forces that threaten ...
WeiterlesenThis is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
WeiterlesenValuation is the single best guide of its kind, helping financial professionals worldwide excel at measuring, managing, and ...
WeiterlesenThe use of static analysis techniques to prove the partial correctness of C code has recently attracted much attention due ...
Weiterlesenfeatures of the programming languages we employ in these programs are plentiful, including object-oriented organizations ...
WeiterlesenThis volume contains the revised version of papers presented at VMCAI 2002,the Third International Workshop on Verification, ...
WeiterlesenThe scope of book includes the sharing and interoperability of tools, the alignment of theory and practice, the identification ...
WeiterlesenTaking the sociocultural long view, Violence in Europe analyzes the prevalence and role of violence—from street crime to ...
WeiterlesenProceedings of the NATO Advanced Research Workshop on Significance of Virus Diseases for Crop Biosecurity in a Developing ...
Weiterlesen