Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
WeiterlesenDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
WeiterlesenThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
WeiterlesenThis volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
WeiterlesenInformation Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
WeiterlesenThis volume, edited by Constantine Stephanidis, contains papers in the thematic area of Universal Access in Human-Computer ...
WeiterlesenThis book presents sequential decision theory from a novel algorithmic information theory perspective. While the former is ...
WeiterlesenThis book is the first to systematically introduce the principles of urban informatics and its application to every aspect ...
WeiterlesenUtilization of Space aims to serve as an authoritative overview for professionals and interested laymen by explaining scientific ...
WeiterlesenThis monograph presents a complete computational system for visual attention and object detection: VOCUS (Visual Object detection ...
WeiterlesenTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
WeiterlesenValuation is a hot topic among life sciences professionals. There is no clear understanding on how to use the different valuation ...
WeiterlesenThis book recognizes that there is no consent on how to apply valuation methodologies in life sciences. One of the complicating ...
WeiterlesenDaniel Pindur analyzes value creation in successful LBOs on investment level conceptually and empirically from an LBO equity ...
WeiterlesenVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Weiterlesenhe primary objective of this book is to offer practical means for strengthening the economics and policy dimension of the ...
WeiterlesenMost data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
WeiterlesenThis book presents theoretical framework and sample applications of variant construction. The first part includes the components ...
WeiterlesenVenture capitalists (VCs) fund ventures with the aim of reaping a capital gain upon exit. Research has identified information ...
WeiterlesenVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Weiterlesen