Electronic Books

Total Books: 41 - 60 /71
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

Lee mas
NoIMG
Intelligent Network Management and Control: Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio / Badr Benmammar

The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...

Lee mas
Internal Migration, Urbanization and Poverty in Asia: Dynamics and Interrelationships

The chapters within this volume examine those complexities using a range of traditional and nontraditional measures—such ...

Lee mas
Introduction to Machine Learning with Applications in Information Security / Mark Stamp

Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...

Lee mas
NoIMG
Maintenance, Safety, Risk, Management and Life-Cycle Performance of Bridges ; Proceedings of the Ninth International Conference on Bridge Maintenance, Safety and Management (IABMAS 2018), 9-13 July 2018, Melbourne, Australia / Nigel Powers, Dan M. Frangopol, Riadh Al-Mahaidi, Colin Caprani

Provides both an up-to-date overview of the field of bridge engineering and significant contributions to the process of more ...

Lee mas
Measure Theory

This book gives a systematic presentation of modern measure theory  as it has developed over the past century and offers ...

Lee mas
Measure, Integration & Real Analysis

This book welcomes students into the fundamental theory of measure, integration, and real analysis. Focusing on an accessible ...

Lee mas
Modeling Decisions: Information Fusion and Aggregation Operators

This book covers the underlying science and application issues related to aggregation operators, focusing on tools used in ...

Lee mas
NoIMG
Monitoring State Compliance with the UN Convention on the Rights of the Child : An Analysis of Attributes

This book presents a discussion on human rights-based attributes for each article pertinent to the substantive rights of ...

Lee mas
NoIMG
Offshore Risk Assessment

This updated and expanded second edition has been informed by a major R&D programme on offshore risk assessment in Norway ...

Lee mas
Parallel Problem Solving from Nature – PPSN XVI : 16th International Conference, PPSN 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part I

This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...

Lee mas
Parallel Problem Solving from Nature – PPSN XVI : 16th International Conference, PPSN 2020, Leiden, The Netherlands, September 5-9, 2020, Proceedings, Part II

This two-volume set LNCS 12269 and LNCS 12270 constitutes the refereed proceedings of the 16th International Conference on ...

Lee mas
Power Analysis Attacks

This book explains how power analysis attacks work. Using many examples, it discusses simple and differential power analysis ...

Lee mas
Principles of Information Security / Michael E. Whitman and Herbert J. Mattord

Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...

Lee mas
NoIMG
Quality Measures in Data Mining

This volume presents the state of the art concerning quality and interestingness measures for data mining. The book summarizes ...

Lee mas
Reforms, Organizational Change and Performance in Higher Education

This book investigates the effects of changes in leadership and managerial structures of Nordic universities resulting from ...

Lee mas
Research Ethics for Students in the Social Sciences

This textbook offers a practical guide into research ethics for undergraduate students in the social sciences. A step-by-step ...

Lee mas
Safety for Particle Accelerators

The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...

Lee mas
Sinkholes and Subsidence

"Sinkholes and Subsidence" provides a twenty-first century account of how the various subsidence features in carbonate ...

Lee mas
NoIMG
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication

From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...

Lee mas
Total Books: 41 - 60 /71