Free Delivery Over $100
2814 books were found.
Mit Erfindung der Schrift entstand gleichzeitig der Bedarf, Geschriebenes vor unbefugten Lesern zu verbergen. Als... Read More >>
Ziel des Buches ist es, die Auswirkungen der Serviceorientierung auf die Softwareentwicklung, die Organisation und... Read More >>
"The project is based on the benefits of Design by Contract on testing. If contracts - preconditions, postconditions,... Read More >>
Der Autor verfolgt das Ziel, das Thema auch kleinen und mittleren Unternehmen näher zu bringen und die Eintrittsbarrieren... Read More >>
"Maverick thinker Nassim Nicholas Taleb had an illustrious career on Wall Street before turning his focus to his... Read More >>
Since the mid 1990s, data hiding has been proposed as an enabling technology for securing multimedia communication,... Read More >>
In this dynamic and authoritative book, the authors combine academic research results with real-world industrial... Read More >>
I am honored to be General Chair for the 2007 (10*^) Working Conference of IFIP Working Group 8.6.1 had some part... Read More >>
Die Autoren gehen auf die gesetzlichen Bestimmungen ein, arbeiten die Klassifizierungskonzepte heraus und erläutern... Read More >>
The third international conference on Information Security Practice and - perience (ISPEC 2007) was held in Hong... Read More >>
Read More >>
Constitutes the refereed post-proceedings of the 10th International Conference on Financial Cryptography and Data... Read More >>
3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting originalresearch... Read More >>
In diesem Buch werden die unterschiedlichen Ebenen des Alignments erläutert und die strategische, architektonische,... Read More >>
This volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference... Read More >>
Constitutes the refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and... Read More >>
Six parallel Business Process Management workshops were held on September 5th, 2005, in conjunction with the Third... Read More >>
Matthias Dehmer rückt das Web Structure Mining, insbesondere die strukturelle Analyse Web-basierter Hypertexte auf... Read More >>
We had sessions on the detection and containment of Internet worm attacks, anomaly detection, automated response... Read More >>
The RSA R Conference, with over 15,000attendees, as well as over 225 sponsors and exhibitors, is the largest computer... Read More >>
IT-Controlling ist mehr als Kostenmanagement. Einige ahnen es nur, immer mehr realisieren es: Konsequentes IT-Controlling... Read More >>