Free Delivery Over $100
1877 books were found.
Collaborative networks in action Collaborative Networks (CN) is a fast developing area, as shown by the already... Read More >>
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses... Read More >>
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc... Read More >>
Grid Computing: Achievements and Prospects, the 9th edited volume of the CoreGRID series, includes selected papers... Read More >>
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information... Read More >>
Contains 16 original contributions and 12 invited papers by distinguished invited speakers. These papers were presented... Read More >>
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
th The 11 Working Conference of IFIP WG 8.6, Open-IT Based Innovation: Moving Towards Cooperative IT Transfer and... Read More >>
It is crucial to keep a balance between the technical aspects of automation and the human and social facets when... Read More >>
The conference, organized by the International Federation for Information Processing, was held in Lannion, France... Read More >>
Including a number of selected papers from the PRO-VE '07 Conference, this book provides a comprehensive overview... Read More >>
I am honored to be General Chair for the 2007 (10*^) Working Conference of IFIP Working Group 8.6.1 had some part... Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
Papers in this unique volume were developed from the 2006 conference hosted by IBM, Service Science, Management,... Read More >>
Micro-assembly is a key enabling technology for cost effective manufacture of new generations of complex micro products.... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods... Read More >>
Leverages the experiences of thought leaders functioning in multiple industry verticals and provides knowledge for... Read More >>
The focus of this book is on mechanisms that affect the VoIP user satisfaction while not explicitly involved in... Read More >>
"We are on the verge of what many are calling the ""second information revolution,"" based on ubiquitous access... Read More >>
Logical Data Modeling offers business managers, analysts, and students a clear, basic systematic guide to defining... Read More >>
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political... Read More >>
Achieving enterprise success necessitates addressing enterprises in ways that match the complexity and dynamics... Read More >>
This book warns of the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in... Read More >>