Electronic Books

Total Books: 21 - 30 /30
978-3-540-74320-0
Recent Advances in Intrusion Detection

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...

Continue reading
978-3-540-39725-0
Recent Advances in Intrusion Detection (vol. # 4219)

This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...

Continue reading
978-3-319-59096-7
Renewing Local Planning to Face Climate Change in the Tropics

This book aims to inspire decision makers and practitioners to change their approach to climate planning in the tropics through ...

Continue reading
978-3-540-71158-2
Risk Assessment, Modeling and Decision Support

The papers in this volume integrate results from current research efforts in earthquake engineering with research from the ...

Continue reading
NoIMG
Risk Management with Applications from the Offshore Petroleum Industry

Risk management is a process to assist in the decision-making. The risk management process takes the potential hazards as ...

Continue reading
978-1-4020-2978-3
Scenario Logic and Probabilistic Management of Risk in Business and Engineering

In this volume the methodological aspects of the scenario logic and probabilistic (LP) non-success risk management are considered. ...

Continue reading
978-3-540-37674-3
Space Debris

In Space Debris Models and Risk Analysis the authors will provide the reader with a comprehensive background to understand ...

Continue reading
978-1-4020-4370-3
The Economics of Forest Disturbances

Provides a unique, state-of-the-art review of both traditional and emerging themes in the economics of natural forest disturbances. ...

Continue reading
978-3-540-32040-1
Trust Management (vol. # 3477)

The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...

Continue reading
978-3-540-85933-8
Visualization for Computer Security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008. Proceedings

This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.

Continue reading
Total Books: 21 - 30 /30