Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...
Continue reading
                This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...
Continue reading
                Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...
Continue reading
                The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...
Continue reading
                The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue reading
                ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
Continue reading
                This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...
Continue reading
                This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...
Continue reading
                This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
Continue reading
                This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Continue reading
                This book is the proceedings of the International Federation for IT and Travel & Tourism (IFITT)’s 28th Annual International ...
Continue reading
                This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...
Continue reading
                The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. ...
Continue reading
                It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...
Continue reading
                This open access book is a must-read for students of and beginners in soil science. In a well-organized and easy-to-follow ...
Continue reading
                This open access monograph provides sociological insight into governmental action on the administration of asylum in the ...
Continue reading
                Inside Relational Databases was first published in 1997 and, rather to our surprise, rapidly reached the status of a classic ...
Continue reading
                This book’s thirteen contributions bring together the results of recent research on determinants of regional specialization, ...
Continue reading
                Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information ...
Continue reading
                Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Continue reading