This classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...
Continue reading
Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...
Continue reading
The Hadron Collider Physics Symposia (HCP) are a new series of conferences that follow the merger of the Hadron Collider ...
Continue reading
This volume is the collected and extended notes from the lectures on Hamiltonian dynamical systems and their applications ...
Continue reading
The Handbook of Database Security: Applications & Trends, an edited volume by renowned researchers within data security, ...
Continue readingThis book provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation ...
Continue reading
Provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, ...
Continue reading
This Handbook presents a comprehensive and rigorous overview of the state-of-the-art on Smart Cities. It provides the reader ...
Continue reading
This handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric ...
Continue reading
This Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary ...
Continue reading
The purpose of this book is to explain how to build and use insect collecting and rearing devices and through explanations ...
Continue reading
This timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to ...
Continue reading
This book constitutes the refereed proceedings of the 6th International Conference on Human Haptic Sensing and Touch Enabled ...
Continue reading
“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Continue reading
Hardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Continue reading
This book provides concise critical points used during most types of head and neck surgeries combined with captivating figures ...
Continue reading
Heterogeneous Wireless Access Networks provides a unified view of the state-of-the-art protocols and architectures for heterogeneous ...
Continue reading
The 75 revised full papers address all current issues of parallel and distributed systems and high performance computing ...
Continue reading
Constitutes the refereed proceedings of the First International Conference on High-Performance Computing and Communications, ...
Continue reading
HPCC has moved into the mainstream of c- puting and has become a key technology in future research and development activities ...
Continue reading