The conference focuses on the state of the art, expe- ence and new trends in the areas of safety, security and reliability ...
Continue readingThese proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue readingThis book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue readingThis book shows that a conceptual design approach for spatio-temporal databases is both feasible and easy to apprehend. While ...
Continue readingA progress in technologies, the increasing expansion and use of digital environments lead to remarkable shifts of business ...
Continue readingIntended to be used as a textbook in undergraduate civil engineering and construction courses to introduce cutting edge mechanical, ...
Continue readingWith an advent of technology, huge collection of digital images is formed as repositories on crime prevention, medical diagnosis, ...
Continue readingContractual Management offers a holistic approach to managerial decision-making based on contracts or business processes ...
Continue readingThis book constitutes the refereed post-workshop proceedings of the International Workshop on Coordination, Organization, ...
Continue readingData is the basis of the digitized economy. Industry 4.0 and digital services produce unprecedented amounts of data and enable ...
Continue readingDigital imaging is now available to all amateur astronomers at a reasonable price. The advent of CCDs, DSLRs and – perhaps ...
Continue readingTakes you through all the basic steps of character design for games and animation, from brainstorming and references to the ...
Continue readingCreative Photography will provide photographers with a range of techniques that will inspire and give them confidence to ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue readingPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
Continue readingFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
Continue readingThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
Continue readingThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Continue reading