These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...
Continue reading
This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...
Continue reading
This book shows that a conceptual design approach for spatio-temporal databases is both feasible and easy to apprehend. While ...
Continue reading
A progress in technologies, the increasing expansion and use of digital environments lead to remarkable shifts of business ...
Continue reading
Intended to be used as a textbook in undergraduate civil engineering and construction courses to introduce cutting edge mechanical, ...
Continue readingWith an advent of technology, huge collection of digital images is formed as repositories on crime prevention, medical diagnosis, ...
Continue reading
Contractual Management offers a holistic approach to managerial decision-making based on contracts or business processes ...
Continue reading
This book constitutes the refereed post-workshop proceedings of the International Workshop on Coordination, Organization, ...
Continue readingData is the basis of the digitized economy. Industry 4.0 and digital services produce unprecedented amounts of data and enable ...
Continue readingDigital imaging is now available to all amateur astronomers at a reasonable price. The advent of CCDs, DSLRs and – perhaps ...
Continue reading
Takes you through all the basic steps of character design for games and animation, from brainstorming and references to the ...
Continue reading
Creative Photography will provide photographers with a range of techniques that will inspire and give them confidence to ...
Continue reading
This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
Continue reading
Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
Continue readingFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
Continue readingThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
Continue reading
This book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Continue reading
DSP for In-Vehicle and Mobile Systems is focused on digital signal processing strategies for improving information access, ...
Continue reading