Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Lee mas
With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
Lee mas
Pro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the ...
Lee mas
Author Sander van Vugt comprehensively covers this server product, and takes you through all of the necessary setup stages ...
Lee mas
Application Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Lee mas
Pro Service-Oriented Smart Clients with .NET 2.0 demonstrates how Smart Clients satisfy multiple purposes. First, you deploy ...
Lee mas
Pro WF: Windows Workflow in .NET 3.0 provides you with the skills you need to incorporate WF into your applications. This ...
Lee mas
The main focus of Pro Web 2.0 Application Development with GWT is an analysis of a full-fledged Web 2.0 application called ...
Lee mas
Inside this book, you'll find everything you need to know about managing SBS 2003 on a daily basis. Author Tony Campbell ...
Lee mas
The major characteristic pathological findings of pulmonary vascular remodelling are increased wall thickening of pulmonary ...
Lee mas
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee mas
The significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...
Lee mas
This book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
Lee mas
This book constitutes the refereed proceedings of the 5th Asian Symposium on Programming Languages and Systems, APLAS 2007, ...
Lee mas
This book constitutes the refereed proceedings of the 16th European Symposium on Programming, ESOP 2007, held in Braga, Portugal ...
Lee mas
Constitutes the refereed proceedings of the Third Asian Symposium on Programming Languages and Systems, APLAS 2005, held ...
Lee mas
This volume contains the proceedings of the ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory ...
Lee mas
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lee mas
This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Lee mas
The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Lee mas