Free Delivery Over $100
1877 books were found.
QoS is an important subject which occupies a central place in overall packet network technologies. The second explains... Read More >>
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital... Read More >>
Features proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity,... Read More >>
Distributed retrieval of multimedia documents, especially the long duration documents, is an imperative step in... Read More >>
The broad scope of Cloud Computing is creating a technology, business, sociolo- cal, and economic renaissance. Cloud... Read More >>
Foundations and Applications of MIS presents a unique systems theory approach to management information system (MIS)... Read More >>
Emphasizes the deep relations existing between the semiring and dioid structures with graphs and their combinatorial... Read More >>
Describes research results and innovative applications in the interdisciplinary field of critical infrastructure... Read More >>
The role open-source geospatial software plays in data handling within the spatial information technology industry... Read More >>
This book introduces a new paradigm, Geographic Hypermedia, which emerges from the convergence of Geographic Information... Read More >>
In the second part of the book, four promising applications of metagraphs are examined: 1) modeling of data relations,... Read More >>
Botnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field,... Read More >>
The IPSec may be used in three different security - mains: Virtual private networks, Application-level security,... Read More >>
The idea for this conference came from a meeting of the IFIP (International Federation for Information Processing)... Read More >>
This book presents queuing models for situations that require a reservation procedure and validate their applicability... Read More >>
The chapter material is organized into five sections: (1) Putting Contingency Theory in its Place, (2) Focus on... Read More >>
This book methods for applying World Wide Web architecture principles to real-world information management issues... Read More >>
The recent technological advances have made it possible to deploy small, l- power, low-bandwidth, and multi-functional... Read More >>
A data warehouse stores large volumes of historical data required for analytical purposes. and loaded into a data... Read More >>
This is an edited volume that develops a common understanding of the various technologies intended to facilitate... Read More >>
The research presented within these articles focuses on the latest methodological developments in three key areas—pricing... Read More >>
Global supply chain is a fact of life in today's world. For instance, what defines an enterprise's staying power... Read More >>
Unfortunately, malware detectors have not kept pace with the evasion techniques commonly used by hackers, i.e.,... Read More >>
This volume of Annals of Information Systems will acknowledge the twentieth anniversary of the founding of the International... Read More >>
In particular, these threats continue to persist due to the flaws of current commercial intrusion detection systems... Read More >>