Free Delivery Over $100
2814 books were found.
This book constitutes the thoroughly refereed post-proceedings of the 17th International Workshop on Security Protocols,... Read More >>
This book constitutes the refereed post-proceedings of the 9th IFIP WG 5.1 International Conference on Product Lifecycle... Read More >>
These cases represent different estimation contexts in terms of software project environment, estimation objectives,... Read More >>
Reviews some key problem settings and results where the cross-layer design paradigm has significantly influenced... Read More >>
This book considers several aspects of providing quality education at a distance: -Quality of systems that support... Read More >>
Database and Application Security XV provides a forum for original research results, practical experiences, and... Read More >>
Addressing the various security issues confronting our Information Society, this title covers the following topics:... Read More >>
Read More >>
This volume, the eighth of a continuing series on information systems science, presents five timely topics which... Read More >>
The summer school will focus on several of the most prominent and practical of such tools from different areas of... Read More >>
Intel, Nokia, Philips Healthcare, small municipalities, e-learning platforms and user communities, this book focuses... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the workshop on Usable Security, USEC... Read More >>
There are some types of complex systems that are built like clockwork, with well-defined parts that interact in... Read More >>
This book constitutes revised selected papers of the 8th International Workshop on Formal Aspects of Component Software,... Read More >>
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings and the doctoral symposium of the 12th International... Read More >>
It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks.... Read More >>
Approximate reasoning is a key motivation in fuzzy sets and possibility theory. Fuzzy Sets in Approximate Reasoning... Read More >>
This book constitutes the thoroughly refereed post-workshop proceedings of the 20th International Workshop on Security... Read More >>
This book constitutes the refereed proceedings of the IFIP WG 8.2 Working Conference ""Shaping the Future of ICT... Read More >>
Wie diese Prozesse aber innerhalb einer IT-Organisation strukturiert werden, welche Schnittstellen zu berücksichtigen... Read More >>
The ability to harness information and communication technology (ICT) is central to national competitiveness and... Read More >>
Egal ob es um multimediale Lernangebote per Internet, moderne Logistikdienstleistungen oder komplexe Versicherungsangebote... Read More >>