Free Delivery Over $100
1872 books were found.
It is crucial to keep a balance between the technical aspects of automation and the human and social facets when... Read More >>
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .... Read More >>
The conference, organized by the International Federation for Information Processing, was held in Lannion, France... Read More >>
Collaborative networks in action Collaborative Networks (CN) is a fast developing area, as shown by the already... Read More >>
Including a number of selected papers from the PRO-VE '07 Conference, this book provides a comprehensive overview... Read More >>
I am honored to be General Chair for the 2007 (10*^) Working Conference of IFIP Working Group 8.6.1 had some part... Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
Incorporates a variety of perspectives, informed by an international background in Service Science, Management and... Read More >>
Micro-assembly is a key enabling technology for cost effective manufacture of new generations of complex micro products.... Read More >>
Logical Data Modeling offers business managers, analysts, and students a clear, basic systematic guide to defining... Read More >>
This has created completely new breeds of marketing models, but major progress has also taken place in existing... Read More >>
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses... Read More >>
Grid Computing: Achievements and Prospects, the 9th edited volume of the CoreGRID series, includes selected papers... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
These proceedings contain the papers selected for presentation at the 23rd Inter- tional Information Security Conference... Read More >>
This book addresses the privacy issue of On-Line Analytic Processing (OLAP) systems. It reviews a series of methods... Read More >>
Leverages the experiences of thought leaders functioning in multiple industry verticals and provides knowledge for... Read More >>
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc... Read More >>
This book proposes a number of techniques to perform data mining tasks in a privacy-preserving way. The survey information... Read More >>
The focus of this book is on mechanisms that affect the VoIP user satisfaction while not explicitly involved in... Read More >>
Decisions on the limits of privacy intrusions – or privacy protection, for that matter – are ultimately political... Read More >>
Achieving enterprise success necessitates addressing enterprises in ways that match the complexity and dynamics... Read More >>
In addition, many of today’s products and services are presently being deployed in a highly competitive environment... Read More >>
This book warns of the threats and vulnerabilities facing our privacy, identity, trust, security and inclusion in... Read More >>
The basic idea of Autonomic Computing is to develop IT systems that are able to manage themselves, as the human... Read More >>