Provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, ...
Continue readingConstitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...
Continue readingThe second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...
Continue readingThe book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...
Continue readingThis book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...
Continue readingThis text takes a practical approach to re-engineering existing systems and looks at data integration, and focuses on proven ...
Continue readingThis book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...
Continue readingThis book constitutes the refereed proceedings of UNISCON 2008 held in Klagenfurt, Austria, during April 22-25, 2008.UNISCON ...
Continue readingAs the medical information systems have been integrated in order to address the core of medicine, including patient care ...
Continue readingPotentially dangerous environmental changes are happening in the atm- phere, oceans, animal habitats and places where hazardous ...
Continue readingInformation Theory and Network Coding consists of two parts: Components of Information Theory, and Fundamentals of Network ...
Continue readingThis book contains revised and extended versions of the best papers presented at the 16th International Conference on Information ...
Continue readingThis book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...
Continue readingThis book consists of three parts. In the first part, within the theoretical basics of mass customization are discussed, ...
Continue readingBuilding research grade multi-agent systems usually involves a broad variety of software infrastructure ingredients like ...
Continue readingIngredients for Successful System Level Design Methodology discusses these wish lists, and provides detailed discussions ...
Continue readingThis book gives you a picture of disruptive innovation and how to master it. Special attention is given to the management ...
Continue readingInnovation Economics, Engineering and Management Handbook 1 is the first of the two volumes that comprise this book. The ...
Continue readingSerious problems and risks can be observed in European freight transportation development. However, the transport and logistics ...
Continue readingBusiness models, which aims at determining how efficient can be a life cycle strategy from different point of view (customer, ...
Continue reading