Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Continue readingDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Continue readingThis book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Continue readingThis volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
Continue readingInformation Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
Continue readingThis volume, edited by Constantine Stephanidis, contains papers in the thematic area of Universal Access in Human-Computer ...
Continue readingThis book presents sequential decision theory from a novel algorithmic information theory perspective. While the former is ...
Continue readingThis book is the first to systematically introduce the principles of urban informatics and its application to every aspect ...
Continue readingUtilization of Space aims to serve as an authoritative overview for professionals and interested laymen by explaining scientific ...
Continue readingThis monograph presents a complete computational system for visual attention and object detection: VOCUS (Visual Object detection ...
Continue readingTthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Continue readingValuation is a hot topic among life sciences professionals. There is no clear understanding on how to use the different valuation ...
Continue readingThis book recognizes that there is no consent on how to apply valuation methodologies in life sciences. One of the complicating ...
Continue readingDaniel Pindur analyzes value creation in successful LBOs on investment level conceptually and empirically from an LBO equity ...
Continue readingVBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Continue readinghe primary objective of this book is to offer practical means for strengthening the economics and policy dimension of the ...
Continue readingMost data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
Continue readingThis book presents theoretical framework and sample applications of variant construction. The first part includes the components ...
Continue readingVenture capitalists (VCs) fund ventures with the aim of reaping a capital gain upon exit. Research has identified information ...
Continue readingVirtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Continue reading