Electronic Books

Total Books: 1621 - 1640 /2046
Scaling a Software Business

This book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...

Weiterlesen
Science with the Atacama Large Millimeter Array : A New Era for Astrophysics

This book describes the enormous capabilities of ALMA, the state of the project, and most notably the scientific prospects ...

Weiterlesen
Scientific and Statistical Database Management : 20th International Conference, SSDBM 2008, Hong Kong, China, July 9-11, 2008 Proceedings

This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...

Weiterlesen
Screening

This book brings together accounts by leading international experts that are essential reading for those working in fields ...

Weiterlesen
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

Weiterlesen
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Weiterlesen
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Weiterlesen
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Weiterlesen
Secure Group Communications Over Data Networks

This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...

Weiterlesen
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Weiterlesen
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Weiterlesen
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

Weiterlesen
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Weiterlesen
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Weiterlesen
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Weiterlesen
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Weiterlesen
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

Weiterlesen
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Weiterlesen
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
Security for Telecommunications Networks

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...

Weiterlesen
Total Books: 1621 - 1640 /2046