Security and Privacy in Mobile Information and Communication Systems
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...
The Image Processing Handbook, Sixth Edition
Image processing is used in a wide variety of applications, for two somewhat different purposes:
1. improving the visual appearance of images to a human observer, including their printing and transmission, and
2. preparing images for the measurement of the features and structures which they reveal.
Data Mining and Machine Learning in Cybersecurity
In the emerging era of Web 3.0, securing cyberspace has gradually evolved into a
critical organizational and national research agenda inviting interest from a multidisciplinary
scientific workforce. There are many avenues into this area, and, in recent
research, machine-learning and data-mining techniques have been applied to design,...
Biology Demystified (TAB Demystified) Guide to understanding basic and applied scientific information, for those who've had not formal training in biology. Includes more than 150 illustrations, a pronunciation guide, self-tests, and reviews. Softcover. DLC: Biology.
UNDERSTAND BIOLOGY -- WITHOUT DISSECTING ANYTHING!
If you're years removed...
Fodder Crops and Amenity Grasses (Handbook of Plant Breeding)
The main role of grasses, clovers and alfalfa in temperate agriculture is still to provide forage for ruminant animals but, in the last decades, the importance of amenity grasses increased markedly and, in the near future, new developments in the areas of energy and biomass use can be envisaged. Fodder Crops and Amenity Grasses, fifth volume in...
|Result Page: 161 160 159 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 |