Free Delivery Over $100
2873 books were found.
This book constitutes the proceedings of the International Conference on Trusted Systems, held in Beijing, China,... Read More >>
The papers cover a wide range of topics in the field of post-quantum public key cryptosystems such as cryptosystems... Read More >>
This book constitutes the refereed proceedings of the 6th International Workshop on Security, IWSEC 2011, held in... Read More >>
The papers are organized in topical sections on attacks, adversaries, and game theory, wireless adhoc and sensor... Read More >>
Here you will learn how to develop an attractive easily readable conceptual business-oriented entity/relationship... Read More >>
This volume is a compendium of recent research and development work pertaining to the problems and issues in the... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 14th Brazilian Symposium on Formal... Read More >>
This book explores fundamental principles for securing IT systems and illustrates them with hands-on experiments... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on... Read More >>
Constitutes the refereed proceedings of four workshops held in conjunction with the Third European Conference, ServiceWave... Read More >>
The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge... Read More >>
This book constitutes the proceedings of the 11th International Conference on Transport Systems Telematics, TST... Read More >>
Multimedia information systems are quite different from traditional information systems, especially in data types,... Read More >>
This volume documents the proceedings of the Symposium on Polymers in Information Storage Technology held as a part... Read More >>
The topics discussed include system design methodology, data structure theory, semantic con siderations, calculus-based... Read More >>
Such systems include shared-disk parallel database systems, distributed file systems, and distributed virtual... Read More >>
Interoperability has been a requirement in NATO ever since the Alliance came into being - an obvious requirement... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security... Read More >>
This book constitutes the thoroughly refereed post-conference proceedings of the 13th International Conference on... Read More >>
Constitutes the refereed proceedings of the 14th International Conference on Model Driven Engineering Languages... Read More >>
This book constitutes the refereed proceedings of the First International Conference on Security Aspects in Information... Read More >>
User-adaptive (or ""personalized"") systems take individual character istics of their current users into account... Read More >>
They provide a comprehensive overview of recent advances in various collaborative network (CN) domains and their... Read More >>
This volume contains contributions based on the lectures delivered and posters presented at the Fifth International... Read More >>
Wireless networking enables two or more computers to communicate using standard network protocols without network... Read More >>