Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...
Lee masWith our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
Lee masPro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the ...
Lee masAuthor Sander van Vugt comprehensively covers this server product, and takes you through all of the necessary setup stages ...
Lee masApplication Express, or APEX, is one of the most innovative products to come out of Oracle in years. APEX is an application ...
Lee masPro Service-Oriented Smart Clients with .NET 2.0 demonstrates how Smart Clients satisfy multiple purposes. First, you deploy ...
Lee masPro WF: Windows Workflow in .NET 3.0 provides you with the skills you need to incorporate WF into your applications. This ...
Lee masThe main focus of Pro Web 2.0 Application Development with GWT is an analysis of a full-fledged Web 2.0 application called ...
Lee masInside this book, you'll find everything you need to know about managing SBS 2003 on a daily basis. Author Tony Campbell ...
Lee masThe major characteristic pathological findings of pulmonary vascular remodelling are increased wall thickening of pulmonary ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThe significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...
Lee masThis book constitutes the proceedings of the 29th European Symposium on Programming, ESOP 2020, which took place in Dublin, ...
Lee masThis book constitutes the refereed proceedings of the 5th Asian Symposium on Programming Languages and Systems, APLAS 2007, ...
Lee masThis book constitutes the refereed proceedings of the 16th European Symposium on Programming, ESOP 2007, held in Braga, Portugal ...
Lee masConstitutes the refereed proceedings of the Third Asian Symposium on Programming Languages and Systems, APLAS 2005, held ...
Lee masThis volume contains the proceedings of the ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory ...
Lee masThe papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, ...
Lee masThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Lee masThe INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...
Lee mas