This book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suiteNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lire la suiteThis book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...
Lire la suiteThis book explores the implications of urbanization in South Asia for water (in-) security in the peri-urban spaces of Dhaka ...
Lire la suiteWater is essential for life and the trigger for this book is in the increasing threats to uninterrupted, good quality water ...
Lire la suiteThis book focuses on Zope 3, though it also addresses the needs of Zope 2 developers who want to use Zope 3 features as they ...
Lire la suiteNew Zope 3 is a web applications server written in Python that allows developing complex web applications rapidly and collaboratively. ...
Lire la suiteThis book constitutes the proceedings of the 7th International Conference on Web Information Systems Engineering, WISE 2006, ...
Lire la suiteThis book constitutes the proceedings of the 21st International Conference on Web Information Systems Engineering, WISE 2020, ...
Lire la suiteThis book constitutes the proceedings of the 17th International Conference on Web Information Systems and Applications, WISA ...
Lire la suiteThis volume contains the proceedings ofthe international workshop WS-FM(Web Services and Formal Methods) held at Vienna University ...
Lire la suiteThe Internet has now become an integral part of everyday life for hundreds of millions of people around the world. However, ...
Lire la suiteThis open access book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research ...
Lire la suiteWi-Fi™, Bluetooth™, ZigBee™ and WiMax™ will provide a complete and detailed description of the recent wireless technologies ...
Lire la suiteWindows Server 2003 Networking Recipes is ideal for network managers and Windows Server 2003 system administrators responsible ...
Lire la suiteWindows Vista: Beyond the Manual is a comprehensive guide to installing, configuring, exploiting, and using the richest Microsoft ...
Lire la suiteThis volume contains the proceedings of the proceedings of the 4th International Conference on Wired/ Wireless Internet Communications ...
Lire la suiteThis book is organized in topical sessions on performance analysis of wireless systems, resource and QoS management, implementation ...
Lire la suiteThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Lire la suiteThe two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...
Lire la suite