Electronic Books

Total Books: 21 - 40 /86
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Lire la suite
Effective IT Service Management

IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...

Lire la suite
Effective IT Service Management

IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...

Lire la suite
Electronic Government : 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...

Lire la suite
Enterprise Interoperability III : New Challenges and Industrial Approaches

This book provides knowledge for cost savings and business improvement as well as new technical solutions. Composed of over ...

Lire la suite
Ernst Denert Award for Software Engineering 2019 Practice Meets Foundations

This book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering ...

Lire la suite
NoIMG
Ernst Denert Award for Software Engineering 2020 : Practice Meets Foundations

This book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering ...

Lire la suite
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Lire la suite
Formal Methods and Testing : An Outcome of the FORTEST Network, Revised Selected Papers

This book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network ...

Lire la suite
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

Lire la suite
High Confidence Software Reuse in Large Systems : 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...

Lire la suite
IP Operations and Management : 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...

Lire la suite
ITIL® Version 3 at a Glance : Information Quick Reference

The desk reference’s unique graphical approach will take otherwise complex textual descriptions and make the information ...

Lire la suite
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Lire la suite
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

Lire la suite
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

Lire la suite
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...

Lire la suite
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

Lire la suite
Making Globally Distributed Software Development a Success Story : International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedings

This volume contains papers presented at the International Conference on Software Process (ICSP 2008) held in Leipzig, Germany, ...

Lire la suite
Total Books: 21 - 40 /86