Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lee masDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lee mas
This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lee mas
This volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...
Lee mas
Information Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...
Lee mas
This volume, edited by Constantine Stephanidis, contains papers in the thematic area of Universal Access in Human-Computer ...
Lee mas
This book presents sequential decision theory from a novel algorithmic information theory perspective. While the former is ...
Lee mas
This book is the first to systematically introduce the principles of urban informatics and its application to every aspect ...
Lee mas
Utilization of Space aims to serve as an authoritative overview for professionals and interested laymen by explaining scientific ...
Lee mas
This monograph presents a complete computational system for visual attention and object detection: VOCUS (Visual Object detection ...
Lee mas
Tthis volume are organized in topical sections on data acquisition and modelling, visualization methods / audio, sensors ...
Lee mas
Valuation is a hot topic among life sciences professionals. There is no clear understanding on how to use the different valuation ...
Lee mas
This book recognizes that there is no consent on how to apply valuation methodologies in life sciences. One of the complicating ...
Lee mas
Daniel Pindur analyzes value creation in successful LBOs on investment level conceptually and empirically from an LBO equity ...
Lee mas
VBSE extends the merely technical ISO software engineering definition with elements not only from economics, but also from ...
Lee mas
he primary objective of this book is to offer practical means for strengthening the economics and policy dimension of the ...
Lee mas
Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...
Lee mas
This book presents theoretical framework and sample applications of variant construction. The first part includes the components ...
Lee mas
Venture capitalists (VCs) fund ventures with the aim of reaping a capital gain upon exit. Research has identified information ...
Lee mas
Virtual Heritage, Applied Technologies and Virtual Environments. With a truly international flavor, these sub-themes covered ...
Lee mas