This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...
Lee masThis book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...
Lee masISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...
Lee masInformation Systems Action Research is organized into three parts: (1) The first part focuses on the methodological issues ...
Lee masComprised of the proceedings of the 13th International Conference on Information Systems Development held August 26th-28th, ...
Lee masThis book deals with enduring themes, new perspectives, and global challenges. In addition to classical themes like Sourcing ...
Lee masThis text takes a practical approach to re-engineering existing systems and looks at data integration, and focuses on proven ...
Lee masThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
Lee masThis book constitutes the refereed proceedings of UNISCON 2008 held in Klagenfurt, Austria, during April 22-25, 2008.UNISCON ...
Lee masAs the medical information systems have been integrated in order to address the core of medicine, including patient care ...
Lee masAn evolving agenda of Information Technology Auditing is subject of this book. The author presents various current and future ...
Lee masThis book presents the current and future trends in the transformation of healthcare services in the Information Society ...
Lee masInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lee masThe area of Information Technology & Lawyers is a fascinating one. Both from a practical and an academic perspective the ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThis book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...
Lee masInformation Theory and Network Coding consists of two parts: Components of Information Theory, and Fundamentals of Network ...
Lee masInformation visualization is not only about creating graphical displays of complex and latent information structures; it ...
Lee masThis collection of papers presented at the ENTER 2008 Conference represents cutting-edge research on the topic of “eTourism: ...
Lee masThis book is the proceedings of the International Federation for IT and Travel & Tourism (IFITT)’s 28th Annual International ...
Lee mas