This volume presents the 17th International Conference on Information Technology—New Generations (ITNG), and chronicles ...
Continue reading
This book is so far the first that covers the current state of the art in 3D imaging for safety and security. Special attention ...
Continue reading
This book is so far the first that covers the current state of the art in 3D imaging for safety and security. Special attention ...
Continue reading
This book. Many scholars have wondered if a non-Western theory of international politics founded on different premises, ...
Continue reading
A Classical Introduction to Cryptography Exercise Book for A Classical Introduction to Cryptography: Applications for Communications ...
Continue reading
Compressing data is an option naturally selected when faced with problems of high costs or restricted space. Written by a ...
Continue reading
Equips students with the tools they will need to tackle the challenges of sustainable building design and engineering. The ...
Continue readingA Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for ...
Continue reading
A Sea Change in a Changing Sea The oceans, seas and coastal areas encompass over 70% of the earth’s surface. They are a ...
Continue reading
This book is the first comprehensive treatment, of structural credit risk models for the simultaneous and consistent pricing ...
Continue reading
Provides the state-of-the-art development on security and privacy for cyber-physical systems (CPS) and industrial Internet ...
Continue reading
Presents cybersecurity aspects of ubiquitous and growing IoT and Cyber Physical Systems. It also introduces a range of conceptual, ...
Continue reading
Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...
Continue reading
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved ...
Continue reading
Covers: Payment cards and protocols EMV contact chip and contactless transactions Disputes, arbitration, and compliance Data ...
Continue reading
Active Directory Field Guide is ideal for Windows and Active Directory administrators and consultants. It contains valuable ...
Continue reading
The proceedings of the sixth Annual International Working Conference on Active Networks, which took place in October 2004 ...
Continue reading
Ad Hoc Networks: Technologies and Protocols is a concise in-depth treatment of various constituent components of ad hoc network ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
The sixth international conference on AD-HOC NetwOrks and Wireless was held in the city of Morelia, Michoacan State, Mexico. ...
Continue reading