This handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric ...
Lire la suiteThis Handbook contains surveys of state-of-the-art concepts, systems, applications, best practices as well as contemporary ...
Lire la suiteThis timely book addresses the conflict between globalism and nationalism. It provides a liberal communitarian response to ...
Lire la suite“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Lire la suiteHardening is the process of protecting a system against unknown threats. System administrators harden against that which ...
Lire la suiteHeterogeneous Wireless Access Networks provides a unified view of the state-of-the-art protocols and architectures for heterogeneous ...
Lire la suiteThe 75 revised full papers address all current issues of parallel and distributed systems and high performance computing ...
Lire la suiteConstitutes the refereed proceedings of the First International Conference on High-Performance Computing and Communications, ...
Lire la suiteHPCC has moved into the mainstream of c- puting and has become a key technology in future research and development activities ...
Lire la suiteThis book constitutes the refereed proceedings of the 14th International Conference on High-Performance Computing, HiPC 2007, ...
Lire la suiteThe ProgramCommittee received a total of 84 submissions; only 17 were selected for presentation as full-length papers and ...
Lire la suiteThis book offers a theoretical introduction to the history of experience on three conceptual levels: everyday experience, ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteInstalling a honeypot inside your network as an early warning system can significantly improve your security. Currently, ...
Lire la suiteHop Integrity in the Internet introduces a new security defense, hop integrity, that can be used against denial-of-service ...
Lire la suiteAt a high level, this project involves building and configuring a hosting server to provide website, email, and FTP hosting ...
Lire la suiteThis book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...
Lire la suiteThis book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...
Lire la suiteHuman Ear Recognition by Computer is the first book on the automatic recognition of human ears. It presents an entire range ...
Lire la suiteConstitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in ...
Lire la suite