Electronic Books

Total Books: 1621 - 1640 /2046
Scaling a Software Business

This book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...

Lee mas
Science with the Atacama Large Millimeter Array : A New Era for Astrophysics

This book describes the enormous capabilities of ALMA, the state of the project, and most notably the scientific prospects ...

Lee mas
Scientific and Statistical Database Management : 20th International Conference, SSDBM 2008, Hong Kong, China, July 9-11, 2008 Proceedings

This book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...

Lee mas
Screening

This book brings together accounts by leading international experts that are essential reading for those working in fields ...

Lee mas
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

Lee mas
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Lee mas
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

Lee mas
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

Lee mas
Secure Group Communications Over Data Networks

This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...

Lee mas
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Lee mas
Securing Biometrics Applications

Biometrics is becoming increasingly common in establishments that require high security such as state security and financial ...

Lee mas
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

Lee mas
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Lee mas
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Lee mas
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

Lee mas
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

Lee mas
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

Lee mas
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lee mas
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Security for Telecommunications Networks

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...

Lee mas
Total Books: 1621 - 1640 /2046