This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue readingA series of reforms have greatly improved the efficiency, reliability, and environmental performance of the Chinese power ...
Continue reading
The first part of these proceedings describes the current capabilities of various satellite experiments which are performing ...
Continue reading
This book constitutes the refereed proceedings of the 13th International Working Conference on Requirements Engineering: ...
Continue reading
Proceedings of the NATO Advanced Research Workshop on Rescue of Sturgeon Species by means of Transboundary Integrated Water ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
This book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue reading
This book includes: foundations of computer science; software theory and practice; education; computer applications in technology; ...
Continue reading
The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue reading
Cities tend to become more crowded, the high rise buildings taller, the traffic nodes more complex. The volume of hazardous ...
Continue reading
The book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Continue reading
Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
Continue reading
Includes details starting from the basics of drone technology and discusses diverse aspects related to drone designing and ...
Continue reading
This Festschrift volume published to honor Jean-Pierre Jouannaud on his 60th Birthday on May 12, 2007, includes 13 refereed ...
Continue reading
The book begins with an introduction of risk analysis, assessment, and management, and includes a new section on the history ...
Continue reading
This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
Continue reading
The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Continue reading
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Continue reading
This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Continue reading
This no-fluff desk reference offers direct access to the information you need to get the job done. It covers basic T-SQL ...
Continue reading