Electronic Books

Total Books: 141 - 160 /253
Middleware 2005

Today, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...

Lee mas
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

Lee mas
Mobile Information Systems II

This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...

Lee mas
Mobile and Wireless Network Security and Privacy

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...

Lee mas
Mobility, Data Mining and Privacy : Geographic Knowledge Discovery

This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...

Lee mas
NoIMG
Modern Socio-Technical Perspectives on Privacy

This book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...

Lee mas
Network Control and Engineering for QOS, Security and Mobility, III

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality ...

Lee mas
Networked RFID : Systems, Software and Services

The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...

Lee mas
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Lee mas
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lee mas
Perspectives and Policies on ICT in Society

The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...

Lee mas
NoIMG
Perspectives on Digital Humanism

This book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...

Lee mas
Pervasive Computing

This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...

Lee mas
Pervasive Computing (vol. # 3468)

WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...

Lee mas
Pervasive Computing (vol. # 3968)

This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...

Lee mas
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

Lee mas
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style ...

Lee mas
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Lee mas
Total Books: 141 - 160 /253