Free Delivery Over $100
2814 books were found.
Read More >>
During the last two decades, there have been many reports about the success and failure of investments in ICT and... Read More >>
Security is the science and technology of secure communications and resource protection from security violation... Read More >>
Conventional block-based segmentation algorithms classify each block separately, assuming independence of feature... Read More >>
Computers communicate globally via satellite or fiber optic links, wide area networks share resources thousands... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Security, Privacy and Applied... Read More >>
Constitutes the proceedings of the International Conference on E-business and Strategy, iCETS 2012, held in Tianjin,... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Decision and Game Theory... Read More >>
Dieser Klassiker der Systemtheorie wurde auf den neuesten Stand gebracht und um ein Kapitel über mehrdimensionale... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on... Read More >>
While in the past a lot of attention has been paid to the business process side, this book now focusses information... Read More >>
Relying on the extensive study of a multi-national Company, this work proposes a process view of the way firms... Read More >>
Organizational Semiotics occupies an important niche in the research community of human communication and information... Read More >>
Sicherheits-Methoden werden bei weltweit verbreiteten, vernetzten e-Commerce-Aktivitäten immer wichtiger. In diesem... Read More >>
The subject of this book is the control of software engineering. As a result, software projects are often late,... Read More >>
Constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC... Read More >>
This book constitutes the refereed proceedings of the 7th International Workshop on Security, IWSEC 2012, held in... Read More >>
This book constitutes the revised selected papers of the 4th International Provenance and Annotation Workshop, IPAW... Read More >>
Last but not least, the book examines current and future trends in outsourcing and offshoring, paying particular... Read More >>
Constitutes the proceedings of the combined 7th International Workshop on Trends in Enterprise Architecture Research... Read More >>
Behandelt die signaltheoretischen Grundlagen der irregulären Abtastung ausgehend von einer exakten funktionalanalytischen... Read More >>
This book presents the thoroughly refereed and revised post-workshop proceedings of the 17th Monterey Workshop,... Read More >>
For a large, complex system, the amount of test cases in a regression test suite can range from a few hundred to... Read More >>