wyszukanych pozycji: 28
Collaborative Computing: Networking, Applications and Worksharing: 4th International Conference, Collaboratecom 2008, Orlando, Fl, Usa, November 13-16
ISBN: 9783642033537 / Angielski / Miękka / 2009 / 848 str. Termin realizacji zamówienia: ok. 20 dni roboczych. CollaborateCom is an annual international forum for dissemination of original ideas and research results in collaborative computing networks, systems, and applications. A major goal and feature of CollaborateCom is to bring researchers from networking, systems, CSCW, collaborative learning, and collaborative education areas - gether. CollaborateCom 2008 held in Orlando, Florida, was the fourth conference of the series and it reflects the accelerated growth of collaborative computing, both as research and application areas. Concretely, recent advances in many computing fields have contributed...
CollaborateCom is an annual international forum for dissemination of original ideas and research results in collaborative computing networks, systems,...
|
|
cena:
384,63 zł |
Roles, Trust, and Reputation in Social Media Knowledge Markets: Theory and Methods
ISBN: 9783319349411 / Angielski / Miękka / 2016 / 198 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to...
Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees award...
|
|
cena:
192,30 zł |
Roles, Trust, and Reputation in Social Media Knowledge Markets: Theory and Methods
ISBN: 9783319054667 / Angielski / Twarda / 2014 / 198 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees awarded by higher learning institutions or occupying formal positions in notable organizations. Expertise is validated by reputations established in an institutionalized marketplace of ideas with a limited number of "available seats" and a stringent process of selection and retention of names, ideas, topics and facts of interest. However, the social media revolution, which has enabled over two billion Internet users not only to consume, but also to...
Knowledge and expertise, especially of the kind that can shape public opinion, have been traditionally the domain of individuals holding degrees award...
|
|
cena:
192,30 zł |
Advances in Database Technology - Edbt 2004: 9th International Conference on Extending Database Technology, Heraklion, Crete, Greece, March 14-18, 200
ISBN: 9783540212003 / Angielski / Miękka / 2004 / 882 str. Termin realizacji zamówienia: ok. 20 dni roboczych. The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion, Crete, Greece, during March 14 18, 2004. The EDBT series of conferences is an established and prestigious forum for the exchange of the latest research results in data management. Held every two years in an attractive European location, the conference provides unique opp- tunities for database researchers, practitioners, developers, and users to explore new ideas, techniques, and tools, and to exchange experiences. The previous events were held in Venice, Vienna, Cambridge, Avignon, Valencia,...
The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion, Crete, Greece, during March 14 18, 2004. The EDBT...
|
|
cena:
384,63 zł |
Object-Oriented Methodologies and Systems: International Symposium Isooms '94, Palermo, Italy, September 21-22, 1994. Proceedings
ISBN: 9783540584513 / Angielski / Miękka / 1994 / 393 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume presents the proceedings of the International Symposium on Object-Oriented Methodologies and Systems (ISOOMS '94), held in Palermo, Italy in September 1994 in conjunction with the AICA 1994 Italian Computer Conference.
The 25 full papers included cover not only technical areas of object-orientation, such as databases, programming languages, and methodological aspects, but also application areas. The book is organized in chapters on object-oriented databases, object-oriented analysis, behavior modeling, object-oriented programming languages, object-oriented information systems,... This volume presents the proceedings of the International Symposium on Object-Oriented Methodologies and Systems (ISOOMS '94), held in Palermo, Italy ...
|
|
cena:
192,30 zł |
Computer Security - Esorics 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I
ISBN: 9783030884178 / Angielski / Miękka / 2021 / 814 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
423,10 zł |
ECOOP 2000 - Object-Oriented Programming: 14th European Conference Sophia Antipolis and Cannes, France, June 12-16, 2000 Proceedings
ISBN: 9783540676607 / Angielski / Mixed media product / 2000 / 490 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Following a 13-year tradition of excellence, the 14th ECOOP conference repeated the success of its predecessors. This excellence is certainly due to the level of maturity that object-oriented technology has reached, which warrants its use as a key paradigm in any computerized system. The principles of the object-oriented paradigm and the features of systems, languages, tools, and methodologies based on it are a source of research ideas and solutions to many in all areas of computer science. ECOOP 2000 showed a thriving eld characterized by success on the practical side and at the same time by...
Following a 13-year tradition of excellence, the 14th ECOOP conference repeated the success of its predecessors. This excellence is certainly due to t...
|
|
cena:
192,30 zł |
Computer Security - Esorics 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings
ISBN: 9783540617709 / Angielski / Miękka / 1996 / 377 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures. This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in Se...
|
|
cena:
192,30 zł |
Computer Security - Esorics 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I
ISBN: 9783030884277 / Angielski / Miękka / 2021 / 812 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
423,10 zł |
Data Protection from Insider Threats
ISBN: 9783031007620 / Angielski / Miękka / 2012 / 92 str. Termin realizacji zamówienia: ok. 20 dni roboczych. As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these organizations' minds. Even though today several data security techniques are available to protect data and computing infrastructures, many such techniques -- such as firewalls and network security tools -- are unable to protect data from attacks posed by those working on an organization's "inside." These "insiders" usually have authorized access to relevant information systems, making it extremely challenging to block the misuse of information...
As data represent a key asset for today's organizations, the problem of how to protect this data from theft and misuse is at the forefront of these or...
|
|
cena:
126,90 zł |
Distributed and Parallel Database Object Management
ISBN: 9781461361855 / Angielski / Miękka / 2012 / 126 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science.
Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field. Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research result...
|
|
cena:
576,96 zł |
Distributed and Parallel Database Object Management
ISBN: 9780792394402 / Angielski / Twarda / 1994 / 126 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research results in this rapidly advancing area of computer science.
Distributed and Parallel Database Object Management serves as an excellent reference, providing insights into some of the most important issues in the field. Distributed and Parallel Database Object Management brings together in one place important contributions and state-of-the-art research result...
|
|
cena:
576,96 zł |
Security for Web Services and Service-Oriented Architectures
ISBN: 9783642426032 / Angielski / Miękka / 2014 / 226 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- sible Markup Language (XML), the Simple Object Access Protocol (SOAP), andrelatedstandards, anddeployedinService-OrientedArchitectures(SOAs) are the key to Web-based interoperability for applications within and across organizations. Furthermore, they are making it possible to deploy appli- tions that can be directly used by people, and thus making the Web a rich and powerful social interaction medium. The term Web 2.0 has been coined to embrace...
Web services technologies are advancing fast and being extensively deployed in many di?erent application environments. Web services based on the eXt- ...
|
|
cena:
192,30 zł |
Homomorphic Encryption and Applications
ISBN: 9783319122281 / Angielski / Miękka / 2014 / 126 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private information retrieval, private searching on streaming data, privacy-preserving data mining, electronic voting and cloud computing. The content is presented in an instructional and practical style, with concrete examples to enhance the reader's understanding. This volume achieves a balance between the theoretical and the practical components of modern information security. Readers will learn key principles of homomorphic encryption as well as...
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed in the fields of private i...
|
|
cena:
269,23 zł |
Private Information Retrieval
ISBN: 9783031012099 / Angielski / Miękka / 2013 / 116 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database without revealing to the server which element is retrieved. PIR has been widely applied to protect the privacy of the user in querying a service provider on the Internet. For example, by PIR, one can query a location-based service provider about the nearest car park without revealing his location to the server. The first PIR approach was introduced by Chor, Goldreich, Kushilevitz and Sudan in 1995 in a multi-server setting, where the user...
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an element from a server in possession of a database...
|
|
cena:
126,90 zł |
RFID Security and Privacy
ISBN: 9783031012129 / Angielski / Miękka / 2013 / 160 str. Termin realizacji zamówienia: ok. 20 dni roboczych. As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of the exciting development in this area is summarized in this book with rigorous analyses and insightful comments. In particular, a systematic overview on RFID security and privacy is provided at both the physical and network level. At the physical level, RFID security means that RFID devices should be identified with assurance in the presence of attacks, while RFID privacy requires that RFID devices should be identified without disclosure of any...
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an energetic teenager during recent years. Much of th...
|
|
cena:
126,90 zł |
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II
ISBN: 9789811580857 / Angielski / Miękka / 2020 / 713 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
384,63 zł |
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I
ISBN: 9789811580826 / Angielski / Miękka / 2020 / 719 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
384,63 zł |
Policy-Based Autonomic Data Governance
ISBN: 9783030172763 / Angielski / Miękka / 2019 / 227 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
249,99 zł |
Machine Learning Techniques for Cybersecurity
ISBN: 9783031282584 / Angielski Termin realizacji zamówienia: ok. 20 dni roboczych. This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical infrastructures vulnerable as a consequence of the dramatic increase in botnets, data ransom, system and network denials of service, sabotage, and data theft attacks. The use of ML techniques for security tasks has been steadily increasing in research and also in practice over the last 10 years. Covering efforts to devise more effective defenses, the book explores security solutions that leverage machine learning (ML) techniques that have recently...
This book explores machine learning (ML) defenses against the many cyberattacks that make our workplaces, schools, private residences, and critical in...
|
|
cena:
173,06 zł |