Electronic Books

Total Books: 21 - 40 /86
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

Lee mas
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Lee mas
Effective IT Service Management

IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...

Lee mas
Effective IT Service Management

IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...

Lee mas
Electronic Government : 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...

Lee mas
Enterprise Interoperability III : New Challenges and Industrial Approaches

This book provides knowledge for cost savings and business improvement as well as new technical solutions. Composed of over ...

Lee mas
Ernst Denert Award for Software Engineering 2019 Practice Meets Foundations

This book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering ...

Lee mas
NoIMG
Ernst Denert Award for Software Engineering 2020 : Practice Meets Foundations

This book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering ...

Lee mas
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Lee mas
Formal Methods and Testing : An Outcome of the FORTEST Network, Revised Selected Papers

This book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network ...

Lee mas
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

Lee mas
High Confidence Software Reuse in Large Systems : 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...

Lee mas
IP Operations and Management : 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...

Lee mas
ITIL® Version 3 at a Glance : Information Quick Reference

The desk reference’s unique graphical approach will take otherwise complex textual descriptions and make the information ...

Lee mas
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Lee mas
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

Lee mas
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

Lee mas
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...

Lee mas
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Lee mas
Making Globally Distributed Software Development a Success Story : International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedings

This volume contains papers presented at the International Conference on Software Process (ICSP 2008) held in Leipzig, Germany, ...

Lee mas
Total Books: 21 - 40 /86