Electronic Books

Total Books: 1201 - 1220 /1261
978-3-540-39635-2
UbiComp 2006: Ubiquitous Computing

This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing, UbiComp 2006. ...

Continue reading
978-3-540-74853-3
UbiComp 2007: Ubiquitous Computing

The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all ...

Continue reading
978-3-030-79276-3
Ubiquitous Communications and Network Computing

This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...

Continue reading
978-3-540-31809-5
Ubiquitous Computing Systems (vol. # 3598)

This book is a collection of papers presented at UCS 2004, held on November 8-9 in Tokyo. The submitted papers presented ...

Continue reading
978-3-540-46289-7
Ubiquitous Computing Systems (vol. # 4239)

This book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...

Continue reading
978-3-540-69293-5
Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...

Continue reading
978-1-4842-7821-5
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

Continue reading
NoIMG
Understanding Blockchain and Cryptocurrencies : A Primer for Implementing and Developing Blockchain Projects / Akira Summers

Discusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...

Continue reading
978-0-387-25614-6
Understanding IPv6

Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...

Continue reading
978-0-387-27636-6
Understanding Intrusion Detection through Visualization

This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...

Continue reading
978-3-662-62157-8
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

Continue reading
978-3-319-99106-1
United Nations Peace Operations in a Changing Global Order

This volume explores how UN peace operations are adapting to four trends in the changing global order: the rebalancing of ...

Continue reading
978-0-387-77152-6
Urban Transportation Planning in the United States

The book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...

Continue reading
978-1-4020-6594-1
Use of Landscape Sciences for the Assessment of Environmental Security

This book examines environmental security from the perspective of landscape sciences, identifying the forces that threaten ...

Continue reading
978-1-4302-0016-1
Using Microsoft Windows Small Business Server 2003

This is the fundamental, definitive reference to Microsoft Small Business Server 2003. And it is relevant for all audiences: ...

Continue reading
978-0-387-33403-5
VLSI-SOC: From Systems to Chips

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-0-387-74909-9
VLSI-SoC: Research Trends in VLSI and Systems on Chip : Fourteenth International Conference on Very Large Scale Integration of System on Chip (VLSI-SoC2006), October 16-18, 2006, Nice, France

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Continue reading
978-1-84800-017-9
Value-Range Analysis of C Programs : Towards Proving the Absence of Buffer Overflow Vulnerabilities

The use of static analysis techniques to prove the partial correctness of C code has recently attracted much attention due ...

Continue reading
978-3-540-69061-0
Verification of Object-Oriented Software. The KeY Approach

features of the programming languages we employ in these programs are plentiful, including object-oriented organizations ...

Continue reading
978-3-540-47813-3
Verification, Model Checking, and Abstract Interpretation

This volume contains the revised version of papers presented at VMCAI 2002,the Third International Workshop on Verification, ...

Continue reading
Total Books: 1201 - 1220 /1261