On behalf of the Program Committee, it is our pleasure to present to you the
proceedings of the 8th Conference on Detection of Intrusions and Malware &
Vulnerability Assessment (DIMVA 2011). Each year DIMVA brings together international
experts from academia, industry and government to present and discuss
novel security research....
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
There is a scientific consensus that we need to act rapidly to
cut carbon dioxide emissions if we are to limit the most
extreme effects of climate change. The IT sector is in a
unique position to act as a catalyst for this change. By
implementing simple efficiencies, the sector can reduce its
carbon footprint – which currently...
This book is the outcome the 19th International Conference on Information Systems
Development (ISD 2010), hosted by the faculty of Mathematics and Physics, Charles
University in Prague during 25–27 August 2010.
The ISD conference evolved from the first Polish-Scandinavian Seminar on Current
Trends in Information Systems...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
We are delighted to present the proceedings of the 2010 International Conference
on Parallel and Distributed Computing and Networks (PDCN 2010) held in
Chongqing, China, during 13–14 December, 2010. The objective of PDCN is to
provide a forum for researchers, educators, engineers, and government officials
involved in the general...
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are...
Data communication networks are widely used today and are an integral part of our
daily life. The Internet is a medium for business, personal, and government communication,
and it is difficult to envision today’s society without this essential
infrastructure. The continued success of the Internet is dependent on our ability
to...
The Encyclopedia of Biometrics provides a comprehensive reference to concepts, technologies, issues, and trends in
the field of biometrics. The volume covers all important aspects – research, development, and applications,
including biometric sensors and devices, methods and algorithms, sample quality, system design and...
Data mining has developed rapidly and has become very popular in the past two decades, but actually has
its origin in the early stages of IT, then being mostly limited to one-dimensional searching in databases.
The statistical basis of what is now also referred to as data mining has often been laid centuries ago. In
corporate...
Joomla is an open source content management system (CMS) that anyone can download for free (see forge.joomla.org/sf/go/projects.joomla/frs). This makes it an ideal choice for small businesses. Don’t let the price tag fool you, though; Joomla is powerful and robust, and more big organizations are choosing to use open source software...