 |
|
|
|
 Internet and Intranet Security Management: Risks and SolutionsIn the last 12 years we have observed amazing growth of electronic communication. From typical local networks through country-wide systems and business-based distributed processing, we have witnessed widespread implementation of computer-controlled transmissions encompassing almost every aspect of our business and private lives.
Internet and... |  |  Web Mobile-Based Applications for Healthcare ManagementIn recent years, there has been a veritable literary frenzy on the theme of healthcare and the Internet. In these works, however, there has not been adequate attention paid to the role that potential users of the site (patients, general practitioners, healthcare personnel, students, private doctors, other healthcare organizations, etc.) could and... |  |  Human Computer Interaction Research in Web Design and EvaluationHuman Computer Interaction Research in Web Design and Evaluation presents research from academics and industry experts, covering various aspects of human computer interaction (HCI) Web design from theories to evaluation. This book highlights the use of methods from the HCI area in Web design, and how these methods can be used in a practical sense.... |
|
 |  |  Advances in Ubiquitous Computing: Future Paradigms and DirectionsThe development and availability of new computing and communication devices, and the increased connectivity between these devices, thanks to wired and wireless networks, are enabling new opportunities for people to perform their operations anywhere and anytime. This technological expansion has developed a multitude of challenges that demand further... |  |  Multimedia Forensics and SecurityAs information technology is rapidly progressing, an enormous amount of media can be easily exchanged through Internet and other communication networks. Increasing amounts of digital image, video, and music have created numerous information security issues and is now taken as one of the top research and development agendas for researchers,... |
|
 |  |  Web Services Security and E-businessMany techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,... |  |  Cost Estimation Techniques for Web ProjectsHaving realistic estimates of effort at an early stage in a Web project's life is vital to the successful management of resources. The principles of the prediction process are identifying the influencing factors, gathering past project data, generating an effort prediction model, and assessing the effectiveness of such prediction model. Cost... |
|
 |  |  Multimedia Information Storage and Retrieval: Techniques and TechnologiesSince multimedia systems are required to store and manipulate a variety of media types -- including text, graphics, images, sound, audio, and video among many others -- applications such as video-on-demand systems, interactive television, and video conferencing are becoming widely available at warp speed. This presents new challenges and obstacles... |  |  Emerging Free and Open Source Software PracticesProject infrastructure and software repositories are now widely available at low cost with easy extraction, providing a foundational base to conduct detailed cyber-archeology at a scale not open to researchers before. Emerging Free and Open Source Software Practices provides a collection of empirical research acting as a focal point to the status... |
|
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 |