This classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...
Continue readingGuide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
Continue readingThe Hadron Collider Physics Symposia (HCP) are a new series of conferences that follow the merger of the Hadron Collider ...
Continue readingThis volume is the collected and extended notes from the lectures on Hamiltonian dynamical systems and their applications ...
Continue readingThe Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
Continue readingThis book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation ...
Continue readingProvides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, ...
Continue readingThis Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
Continue readingThis handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric ...
Continue readingThis Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary ...
Continue readingThe purpose of this book is to explain how to build and use insect collecting and rearing devices and through explanations ...
Continue readingThis timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to ...
Continue readingThis book constitutes the refereed proceedings of the 6th International Conference on Human Haptic Sensing and Touch Enabled ...
Continue reading“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Continue readingHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Continue readingThis book provides concise critical points used during most types of head and neck surgeries combined with captivating figures ...
Continue readingHeterogeneous Wireless Access Networks provides a unified view of the state-of-the-art protocols and architectures for heterogeneous ...
Continue readingThe 75 revised full papers address all current issues of parallel and distributed systems and high performance computing ...
Continue readingConstitutes the refereed proceedings of the First International Conference on High-Performance Computing and Communications, ...
Continue readingHPCC has moved into the mainstream of c- puting and has become a key technology in future research and development activities ...
Continue reading