This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...
Lire la suite
This book is a collection of papers presented at UCS 2004, held on November 8-9 in Tokyo. The submitted papers presented ...
Lire la suite
This book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...
Lire la suite
The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...
Lire la suite
Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lire la suiteDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lire la suite
This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...
Lire la suite
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Lire la suite
This volume explores how UN peace operations are adapting to four trends in the changing global order: the rebalancing of ...
Lire la suite
The book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...
Lire la suite
features of the programming languages we employ in these programs are plentiful, including object-oriented organizations ...
Lire la suite
The scope of book includes the sharing and interoperability of tools, the alignment of theory and practice, the identification ...
Lire la suite
Proceedings of the NATO Advanced Research Workshop on Significance of Virus Diseases for Crop Biosecurity in a Developing ...
Lire la suite
This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suite
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lire la suiteThis book explores the implications of urbanization in South Asia for water (in-) security in the peri-urban spaces of Dhaka ...
Lire la suite
Water is essential for life and the trigger for this book is in the increasing threats to uninterrupted, good quality water ...
Lire la suite
This book focuses on Zope 3, though it also addresses the needs of Zope 2 developers who want to use Zope 3 features as they ...
Lire la suite
New Zope 3 is a web applications server written in Python that allows developing complex web applications rapidly and collaboratively. ...
Lire la suite
This book constitutes the proceedings of the 7th International Conference on Web Information Systems Engineering, WISE 2006, ...
Lire la suite