Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
Data and Applications Security: Developments and Directions (IFIP International Federation for Information Processing)
New technology is always evolving and companies must have appropriate security for their businesses to be able to keep up to date with the changes. With the rapid growth of the internet and the world wide web, data and applications security will always be a key topic in industry as well as in the public sector, and has implications for the...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Artificial Intelligence Applications and Innovations (IFIP International Federation for Information Processing)
Artificial Intelligence Applications and Innovations (IFIP International Federation for Information Processing)
Artificial Intelligence is one of the oldest and most exciting subfields of computing, covnering such areas as intelligent robotics, intelligent planning and scheduling, model-based reasoning, fault diagnosis, natural language processing, maching translation, knowledge representation and reasoning, knowledge-based systems, knowledge engineering,...
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China
Advances in Digital Forensics VI: Sixth IFIP WG 11.9 International Conference on Digital Forensics, Hong Kong, China

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every type of crime now involves some...

Algorithms from and for Nature and Life: Classification and Data Analysis (Studies in Classification, Data Analysis, and Knowledge Organization)
Algorithms from and for Nature and Life: Classification and Data Analysis (Studies in Classification, Data Analysis, and Knowledge Organization)

This volume provides approaches and solutions to challenges occurring at the interface of research fields such as, e.g., data analysis, data mining and knowledge discovery, computer science, operations research, and statistics. In addition to theory-oriented contributions various application areas are included. Moreover, traditional...

Mobile Web Services: Architecture and Implementation
Mobile Web Services: Architecture and Implementation

Mobile Web services offer new possibilities and extraordinary rewards for the mobile telecommunications market.

Service-oriented architectures (SOAs) implemented with Web services are fundamentally changing business processes supported by distributed computing. These technologies bring forward the promise of...

Programming Internet Email
Programming Internet Email
The Internet's "killer app" is not the World Wide Web or Push technologies: it is humble electronic mail. More people use email than any other Internet application. As the number of email users swells, and as email takes on an ever greater role in personal and business communication, Internet mail protocols have become not just an...
Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition

This newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as...

Getting Started with Kubernetes - Second Edition
Getting Started with Kubernetes - Second Edition

Learn how to schedule and run application containers using Kubernetes.

About This Book

  • Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
  • Confidently manage your container clusters and networks using Kubernetes
  • This practical...
Timing for Animation
Timing for Animation

Learn all the tips and tricks of the trade from the professionals. How should the drawings be arranged in relation to each other? How many are needed? How much space should be left between one group of drawings and the next? How long should each drawing, or group of drawings, remain on the screen to give the maximum dramatic effect? The art of...

Pro SQL Database for Windows Azure: SQL Server in the Cloud
Pro SQL Database for Windows Azure: SQL Server in the Cloud

Pro SQL Database for Windows Azure, 2nd Edition shows how to create enterprise-level database deployments without the usual investment in datacenter and other infrastructure. Take advantage instead of Microsoft’s worldwide backbone for cloud computing that delivers all the power of SQL Server in the form of the cloud-based...

Information Systems Research: Relevant Theory and Informed Practice (IFIP International Federation for Information Processing)
Information Systems Research: Relevant Theory and Informed Practice (IFIP International Federation for Information Processing)
International Federation of Information Processing (IFIP) Working Group 8.2
conference entitled “Relevant Theory and Informed Practice: Looking Forward from
a 20 Year Perspective on IS Research.” The conference was held at the University of
Manchester in Manchester, England, on July 15-17, 2004.

It was during
...
unlimited object storage image
Result Page: 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy