Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
WeiterlesenDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Weiterlesen
This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Weiterlesen
This volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
Weiterlesen
Information Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
Weiterlesen
This volume, edited by Constantine Stephanidis, contains papers in the thematic area of Universal Access in Human-Computer ...
Weiterlesen
This book presents sequential decision theory from a novel algorithmic information theory perspective. While the former is ...
Weiterlesen
This book is the first to systematically introduce the principles of urban informatics and its application to every aspect ...
Weiterlesen
Utilization of Space aims to serve as an authoritative overview for professionals and interested laymen by explaining scientific ...
Weiterlesen
This monograph presents a complete computational system for visual attention and object detection: VOCUS (Visual Object detection ...
Weiterlesen
Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Weiterlesen
Valuation is a hot topic among life sciences professionals. There is no clear understanding on how to use the different valuation ...
Weiterlesen
This book recognizes that there is no consent on how to apply valuation methodologies in life sciences. One of the complicating ...
Weiterlesen
Daniel Pindur analyzes value creation in successful LBOs on investment level conceptually and empirically from an LBO equity ...
Weiterlesen
VBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Weiterlesen
he primary objective of this book is to offer practical means for strengthening the economics and policy dimension of the ...
Weiterlesen
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
Weiterlesen
This book presents theoretical framework and sample applications of variant construction. The first part includes the components ...
Weiterlesen
Venture capitalists (VCs) fund ventures with the aim of reaping a capital gain upon exit. Research has identified information ...
Weiterlesen
Virtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Weiterlesen