Free Delivery Over $100
12745 books were found.
Computer-Supported Collaboration with Applications to Software Development reviews the theory of collaborative groups... Read More >>
This book brings the reader to the frontier of multimedia applications. Read More >>
Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Information Systems Security,... Read More >>
In this book readers will find all concepts that will coin tomorrow’s e-business: virtual sales assistants (shopbots),... Read More >>
Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in... Read More >>
This collection of papers is the result of a workshop sponsored by NATO's Defense Research Group Panel 8 in the... Read More >>
Erst mit der Möglichkeit der Programmierung und der Entwicklung der theoretischen Informatik hat die Rekursion ihr... Read More >>
The book covers the results of a variety of major projects in industrial mathematics following an initiative of... Read More >>
Welcome to the second volume of the Kluwer International Series on ADVANCES IN INFORMATION SECURITY. Read More >>
Biometric Solutions for Authentication in an E-World provides a collection of sixteen chapters containing tutorial... Read More >>
In this international collection of papers there is a wealth of knowledge on artificial intelligence (AI) and cognitive... Read More >>
It is also about the virtual spaces created by virtual reality hardware (CAVEs, panoramic screens, head mounted... Read More >>
This book is a result of ISD2000-The Ninth International Conference on Infor mation Systems Development: Methods... Read More >>
They do not link enterprise management with network and systems management. The book is intended to familiarize... Read More >>
Revere system builds large-scale, self-organizing and resilient overlay networks on top of the Internet to push... Read More >>
Information and Process Integration in Enterprises: Rethinking Documents is a bold attempt to address information... Read More >>
Applications Of Data Mining In Computer Security presents a collection of research efforts on the use of data mining... Read More >>
Grid resource management is the process of identifying requirements, matching resources to applications, allocating... Read More >>
This book constitutes the proceedings of the 5th International Conference on Advances in Information Technology,... Read More >>
Theoretische Texte über Marketing gibt es viele, aber wie füge ich all die theoretischen Ideen in der Praxis so... Read More >>
Nach einer kompakten Darstellung der Grundlagen der Pressearbeit arbeiten die Autoren die besonderen Aspekte der... Read More >>
Das Buch gibt nicht nur Ratschläge, wie Risiken vermieden werden können, sondern geht im Detail auf die Planung,... Read More >>