Electronic Books

Total Books: 141 - 160 /253
Middleware 2005

Today, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...

Weiterlesen
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

Weiterlesen
Mobile Information Systems II

This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...

Weiterlesen
Mobile and Wireless Network Security and Privacy

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...

Weiterlesen
Mobility, Data Mining and Privacy : Geographic Knowledge Discovery

This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...

Weiterlesen
NoIMG
Modern Socio-Technical Perspectives on Privacy

This book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...

Weiterlesen
Network Control and Engineering for QOS, Security and Mobility, III

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality ...

Weiterlesen
Networked RFID : Systems, Software and Services

The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...

Weiterlesen
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Weiterlesen
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Weiterlesen
Perspectives and Policies on ICT in Society

The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...

Weiterlesen
NoIMG
Perspectives on Digital Humanism

This book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...

Weiterlesen
Pervasive Computing

This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...

Weiterlesen
Pervasive Computing (vol. # 3468)

WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...

Weiterlesen
Pervasive Computing (vol. # 3968)

This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...

Weiterlesen
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

Weiterlesen
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style ...

Weiterlesen
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Weiterlesen
Total Books: 141 - 160 /253