Electronic Books

Total Books: 161 - 180 /308
Investing in Private Equity Partnerships

Private equity has become an important asset class for institutional investors. As the asset class grows and investors get ...

Lee mas
Legal Programming

LEGAL PROGRAMMING: Designing Legally Compliant RFID and Software Agent Architectures for Retail Processes and Beyond provides ...

Lee mas
Location- and Context-Awareness

These proceedings contain the papers presented at the 3rd International S- posium on Location- and Context-Awareness in September ...

Lee mas
Location- and Context-Awareness (vol. # 3987)

nd These proceedings contain the papers presented at the 2 International Workshop on Location- and Context-Awareness in May ...

Lee mas
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Lee mas
Managing Information Systems Security and Privacy

The book deals with the management of information systems security and privacy, based on a model that covers technological, ...

Lee mas
Middleware 2005

Today, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...

Lee mas
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

Lee mas
Mobile Information Systems II

This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...

Lee mas
Mobile and Wireless Network Security and Privacy

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...

Lee mas
Mobility, Data Mining and Privacy : Geographic Knowledge Discovery

This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...

Lee mas
NoIMG
Modern Socio-Technical Perspectives on Privacy

This book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...

Lee mas
Network Control and Engineering for QOS, Security and Mobility, III

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality ...

Lee mas
Networked RFID : Systems, Software and Services

The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...

Lee mas
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Lee mas
Neuroimmunology of Sleep

Neuroimmunology of Sleep provides an introduction to the interphase between sleep and neuroimmunology. Written both from ...

Lee mas
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

Lee mas
Perspectives and Policies on ICT in Society

The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...

Lee mas
NoIMG
Perspectives on Digital Humanism

This book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...

Lee mas
Total Books: 161 - 180 /308