Electronic Books

Total Books: 81 - 100 /263
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...

Lire la suite
Database and Expert Systems Applications

This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...

Lire la suite
Demystifying Internet of Things Security Successful IoT Device/Edge and Platform Security Deployment

The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...

Lire la suite
Dependability Metrics : Advanced Lectures

This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...

Lire la suite
Designing Big Data Platforms: How to Use, Deploy, and Maintain Big Data Systems / Yusuf Aytas

Provides expert guidance and valuable insights on getting the most out of Big Data systems. Helps readers understand how ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

Lire la suite
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Lire la suite
Distributed Computing -- IWDC 2004

Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful ...

Lire la suite
Distributed Computing and Networking : 9th International Conference, ICDCN 2008, Kolkata, India, January 5-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 9th International Conference on Distributed Computing and Networking, ...

Lire la suite
E-Business and Telecommunication Networks :Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers

This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...

Lire la suite
E-Democracy – Safeguarding Democracy and Human Rights in the Digital Age : 8th International Conference, e-Democracy 2019, Athens, Greece, December 12-13, 2019, Proceedings

This book constitutes the refereed proceedings of the 8th International Conference on E-Democracy, E-Democracy 2019, held ...

Lire la suite
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Lire la suite
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

Lire la suite
Emerging Technologies in Computing : Third EAI International Conference, iCETiC 2020, London, UK, August 19–20, 2020, Proceedings

This book constitutes the refereed conference proceedings of the Third International Conference on Emerging Technologies ...

Lire la suite
Ethical and Social Issues in the Information Age

This book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...

Lire la suite
Ethical and Social Issues in the Information Age

This book takes off where the second ended to examine ethical, social, and policy challenges stemming from the emergence ...

Lire la suite
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lire la suite
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lire la suite
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Lire la suite
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

Lire la suite
Total Books: 81 - 100 /263