![]() |
(Re)Inventing the Internet : Critical Case Studies
ISBN: 9789460917325 / Angielski / Miękka / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, education, and entertainment are all still openly disputed and debated. The issues include censorship and network control, privacy and surveillance, the political impact of activist blogging, peer to peer file sharing, the effects of video games on children, and many others. Media conglomerates, governments and users all contribute to shaping the forms and functions of the Internet as the limits and potentialities of the technologies are tested and...
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, educatio...
|
cena:
93,70 |
![]() |
(Re)Inventing the Internet : Critical Case Studies
ISBN: 9789460917332 / Angielski / Twarda / 146 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, education, and entertainment are all still openly disputed and debated. The issues include censorship and network control, privacy and surveillance, the political impact of activist blogging, peer to peer file sharing, the effects of video games on children, and many others. Media conglomerates, governments and users all contribute to shaping the forms and functions of the Internet as the limits and potentialities of the technologies are tested and...
Although it has been in existence for over three decades, the Internet remains a contested technology. Its governance and role in civic life, educatio...
|
cena:
442,97 |
![]() |
Information Theory and Best Practices in the It Industry
ISBN: 9781461430421 / Angielski / Twarda / 216 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Recognizing the importance of benchmarking in service industries, this volume presents in-depth analysis of a range of comprehensive benchmarking methodologies that deploy multiple variables and which can be applied to the complexities of the IT sector.
Recognizing the importance of benchmarking in service industries, this volume presents in-depth analysis of a range of comprehensive benchmarking meth...
|
cena:
403,47 |
![]() |
Design-Type Research in Information Systems: Findings and Practices
ISBN: 9781466601314 / Angielski / Twarda / 310 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Design-type research deals with the multidisciplinary issues of methodology of design, design principles and guidelines, and philosophy of design with the aim of producing knowledge that aids designers in becoming more effective and efficient. Design-Type Research in Information Systems: Findings and Practices aims to demonstrate that Design-Type Research is a legitimate scientific activity, particularly in the context of the field of Information Systems. Contending that the philosophy, methodology and principles of traditional science also apply to design-type of science, the research...
Design-type research deals with the multidisciplinary issues of methodology of design, design principles and guidelines, and philosophy of design with...
|
cena:
887,12 |
![]() |
Information Theory: New Research
ISBN: 9781621003250 / Angielski / Twarda / 282 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Information theory is a branch of applied mathematics and engineering involving the quantification of information. This book presents topical research in the study of the developments in information theory, including information theory as applied to the analysis of biological sequences.
Information theory is a branch of applied mathematics and engineering involving the quantification of information. This book presents topical research...
|
cena:
969,52 |
![]() |
Connecting Canadians: Investigations in Community Informatics
ISBN: 9781926836041 / Angielski / Miękka / 520 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Connecting Canadians represents the work of the Community Research Alliance for Community Innovation and Networking (CRACIN), the largest national and international research effort to examine the burgeoning field of community informatics, a cross-disciplinary approach to the mobilization of information and communications technologies (ICT) for community change. Drawing on diverse theoretical perspectives, from sociology to library and information sciences to women's studies, the essays not only document specific local initiatives but analyze the overall trajectory of the... Connecting Canadians represents the work of the Community Research Alliance for Community Innovation and Networking (CRACIN), the largest na... |
cena:
169,68 |
![]() |
Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings
ISBN: 9783642231407 / Angielski / Miękka / 408 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.
This book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 20...
|
cena:
201,72 |
![]() |
Recent Advances in Intrusion Detection: 14th International Symposium, Raid 2011, Menlo Park, Ca, Usa, September 20-21, 2011, Proceedings
ISBN: 9783642236433 / Angielski / Miękka / 399 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA, USA in September 2011. The 20 papers presented were carefully reviewed and selected from 87 submissions. The papers are organized in topical sections on application security; malware; anomaly detection; Web security and social networks; and sandboxing and embedded environments.
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection, RAID 2011, held in Menlo Park, CA...
|
cena:
201,72 |
![]() |
Cryptographic Protocol: Security Analysis Based on Trusted Freshness
ISBN: 9783642240720 / Angielski / Twarda / 373 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. "Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is... "Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on ... |
cena:
685,93 |
![]() |
Vlsi-Soc: Forward-Looking Trends in IC and Systems Design: 18th Ifip Wg 10.5/IEEE International Conference on Very Large Scale Integration, Vlsi-Soc 2
ISBN: 9783642285653 / Angielski / Twarda / 358 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Covers VLSI technology and advanced research. This book addresses the trend towards increasing chip integration and technology process advancements bringing about stimulating new challenges both at the physical and system-design levels, as well as in the test of theses systems.
Covers VLSI technology and advanced research. This book addresses the trend towards increasing chip integration and technology process advancements br...
|
cena:
201,72 |
![]() |
Thinkquest 2010: Proceedings of the First International Conference on Contours of Computing Technology
ISBN: 9788184899887 / Angielski / Twarda / 323 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This proceedings is a representation of decades of research, teaching and application in the field. Image Processing, Fusion and Information Technology areas, Digital radio Communication, Wimax, Electrical engg, VLSI approach to processor design, embedded systems design are dealt in detail through models and illustrative techniques.
This proceedings is a representation of decades of research, teaching and application in the field. Image Processing, Fusion and Information Technolog...
|
cena:
403,47 |
![]() |
Information Theory for Continuous Systems
ISBN: 9789810209858 / Angielski / Twarda / 324 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book provides a systematic mathematical analysis of entropy and stochastic processes, especially Gaussian processes, and its applications to information theory. The contents fall roughly into two parts. In the first part the main emphasis is on entropy; a unified treatment of entrop in information theory, probability theory and mathematical statistics is presented. The second part deals mostly with information theory for continuous communication systems, based on the most recently available methods in probability theory, and the analysis developed in the first part. Particular emphasis...
This book provides a systematic mathematical analysis of entropy and stochastic processes, especially Gaussian processes, and its applications to info...
|
cena:
470,24 |
![]() |
Mathematical Analysis, Wavelets and Signal Processing
ISBN: 9780821803844 / Angielski / Miękka / 354 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This work contains the proceedings of an international conference held in Cairo (January 1994), where mathematicians and engineers gathered to exchange ideas and to discuss new research trends. Mathematical and engineering discoveries, such as wavelets, multiresolution analysis, and subband coding schemes, caused rapid advancements in signal analysis and processing, necessitating an interdisciplinary approach. Contributors to this conference demonstrated that some traditional areas of mathematical analysis - sampling theory, approximation theory, and orthogonal polynomials - have proven...
This work contains the proceedings of an international conference held in Cairo (January 1994), where mathematicians and engineers gathered to exchang...
|
cena:
557,51 |
![]() |
State Variables and Communication Theory
ISBN: 9780262523547 / Angielski / Miękka / 198 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Although state variable concepts are a part of modern control theory, they have not been extensively applied in communication theory. The purpose of this book is to demonstrate how the concepts and methods of state variables can be used advantageously in analyzing a variety of communication theory problems. In contrast to the impulse response and covariance function description of systems and random processes commonly used in the analysis of communication problems, Professor Baggeroer points out that a state variable approach describes these systems and processes in terms of differential... Although state variable concepts are a part of modern control theory, they have not been extensively applied in communication theory. The purpose o... |
cena:
193,06 |
![]() |
ICT Influences on Human Development, Interaction, and Collaboration
ISBN: 9781466619579 / Angielski / Twarda / 334 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has become a powerful tool for human development. Nevertheless, the positive impact technology has on human development may become tainted by the risks it entails.ICT Influences on Human Development, Interaction, and Collaboration creates awareness on how ICTs contribute to human development in multiple areas. This publication describes the link between ICTs and human development, which includes economic, social, and political development. It...
Technology has always played a decisive role in humanity's progress. Throughout history, it has not only strengthened economic development but has bec...
|
cena:
887,12 |
![]() |
Information Security Technology for Applications: 16th Nordic Conference on Security IT Systems, NordSec 2011, Talinn, Estonia, 26-28 October 2011, Revised Selected Papers
ISBN: 9783642296147 / Angielski / Miękka / 273 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, October 26-28, 2011. The 16 revised papers presented together with 2 invited talks were carefully reviewed and selected from 51 submissions. The papers are organized in topical sections on applied cryptography, commercial security policies and their enforcement, communication and network security, security modeling and metrics, economics, law and social aspects of security, and software security and malware.
This book constitutes the refereed proceedings of the 16th International Conference on Secure IT Systems, NordSec 2011, held in Tallinn, Estonia, Octo...
|
cena:
201,72 |
![]() |
Engineering Secure Two-Party Computation Protocols: Design, Optimization, and Applications of Efficient Secure Function Evaluation
ISBN: 9783642300417 / Angielski / Miękka / 138 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive... Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate... |
cena:
484,18 |
![]() |
Trustworthy Global Computing: 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers
ISBN: 9783642300646 / Angielski / Miękka / 243 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 2011. This title features papers that are organized in topical sections on modeling formalisms for concurrent systems; model checking and quantitative extensions thereof; and more.
Constitutes the refereed proceedings of the 6th International Symposium on Trustworthy Global Computing, TGC 2011, held in Aachen, Germany, in June 20...
|
cena:
201,72 |
![]() |
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems: 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-2
ISBN: 9783642309540 / Angielski / Miękka / 225 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. Contains the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on "Information Security Theory and Practice: Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems", WISTP 2012, held in Egham, UK, in June 2012. This title includes topics on protocols, privacy, policy and access control, and more.
Contains the refereed proceedings of the 6th IFIP WG 11.2 International Workshop on "Information Security Theory and Practice: Security, Privacy and T...
|
cena:
201,72 |
![]() |
Applied Cryptography and Network Security: 10th International Conference, Acns 2012, Singapore, June 26-29, 2012, Proceedings
ISBN: 9783642312830 / Angielski / Miękka / 580 str. Termin realizacji zamówienia: ok. 5-8 dni roboczych. This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in Singapore, in June 2012. The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in...
This book constitutes the refereed proceedings of the 10th International Conference on Applied Cryptography and Network Security, ACNS 2012, held in S...
|
cena:
201,72 |