Free Delivery Over $100
8990 books were found.
Constitutes the refereed proceedings of the 4th International Conference on Pairing-Based Cryptography, Pairing... Read More >>
This LNCS volume contains the papers presented at the First Swarm, Evolutionary and Memetic Computing Conference... Read More >>
Comprises selected papers of the Second International Conference on Future Generation Information Technology, FGIT... Read More >>
P- gram Committee members were allowed to use external reviewers to assist with their reviews, but remained responsible... Read More >>
This year, WISE received 170 submissions from 25 countries, including Argentina, Australia, Austria, Belgium, Canada,... Read More >>
Revised for the current CompTIA A+ exams, this test prep tool features 1000+ realistic practice exam questions with... Read More >>
Table of Contents: The Many Meanings of Information / Information asThought and Memory / Information as Communication... Read More >>
The worldwide popularisation of mobile communication technologies and the incre- ing awareness of usability issues... Read More >>
Contains 16 original contributions and 12 invited papers by distinguished invited speakers. These papers were presented... Read More >>
Signal Processing for Image Enhancement and Multimedia Processing is an edited volume, written by well-recognized... Read More >>
This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume... Read More >>
The conference, organized by the International Federation for Information Processing, was held in Lannion, France... Read More >>
First of all an open network, as IP is, imposes the necessity of a - cure network, to guarantee the privacy of the... Read More >>
A large international conference on Communication Systems and Electrical Engineering was held in Hong Kong on March... Read More >>
I am honored to be General Chair for the 2007 (10*^) Working Conference of IFIP Working Group 8.6.1 had some part... Read More >>
Vulnerability in a network or application can in turn be used to launch various attacks like cross-site scripting... Read More >>
Consequently, ontology alignment and mapping for data integration has become central to building a world-wide semantic... Read More >>
Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses... Read More >>
The Ware Report, which was published in 1970, pointed out the need for c- puter security and highlighted the di?culties... Read More >>
Privacy preserving data mining implies the ""mining"" of knowledge from distributed data without violating the privacy... Read More >>
This book presents the latest research results in the area of secure localization for both wireless mobile ad hoc... Read More >>
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .... Read More >>
The focus of this book is on mechanisms that affect the VoIP user satisfaction while not explicitly involved in... Read More >>
Grid Computing: Achievements and Prospects, the 9th edited volume of the CoreGRID series, includes selected papers... Read More >>
In our view, a prediction problem can be solved by the same methods, whether the data are structured - merical measurements... Read More >>