Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...
Lire la suiteDiscusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...
Lire la suiteThis book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...
Lire la suiteThis monograph provides an overview of the everyday lives of undocumented migrants, thereby focusing on housing, employment, ...
Lire la suiteThis volume contains selected transcripts from presentations given at the conference. Speakers include: Chris Adami, Kenneth ...
Lire la suitethis book is based on the fact that it is the usersâ judgments that is the final measure regarding usability and acceptance ...
Lire la suiteThe scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Lire la suiteMultimedia networking applications and, in particular, the transport of c- pressed video are expected to contribute signi?cantly ...
Lire la suiteThis book constitutes the refereed proceedings of the 17th International Conference on Virtual Reality and Augmented Reality, ...
Lire la suiteThis book has focused on helping human analysts to detect anomalies and patterns, particularly in computer network defense.
Lire la suiteThe amount of digitized information available on the Internet, in digital libraries, and other forms of information systems ...
Lire la suiteVargas-Quesada and Moya-Anegón propose a methodology for visualizing large scientific domains. They create science maps, ...
Lire la suiteNetworked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Lire la suiteThis book is open access under a CC-BY license. This open access volume presents papers on vocational education, project-based ...
Lire la suiteWith contributions from some of the most experienced and knowledgeable experts in the field, the book desbribes the state-of-the-art ...
Lire la suiteThis book presents a pathbreaking analysis of vote-buying in Indonesia. Drawing on a stunning array of evidence, Muhtadi ...
Lire la suiteThis book features original research in the areas of algorithms and data structures, combinatorial algorithms, graph drawings ...
Lire la suiteThis volume presents a detailed study of partial differential equations on planar graphs modeling networked flexible mechanical ...
Lire la suiteThis book gives a comprehensive account of the principles and applications of such filters, including their technological ...
Lire la suiteHow can our societies be stabilized in a crisis? Why can we enjoy and understand Shakespeare? Why are fruitflies uniform? ...
Lire la suite