Home | Amazing | Today | Tags | Publishers | Years | Search 
Security in Computing Systems: Challenges, Approaches and Solutions
Security in Computing Systems: Challenges, Approaches and Solutions

This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of secu rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing sys tems,...

Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics
Mathematical Structures for Computer Science: A Modern Treatment of Discrete Mathematics

The important role that discrete structures plays in computer science is gaining recognition. Computing Curricula 2001 (CC2001), the latest curriculum recommendation for computer- related education, was a joint undertaking of the Institute for Electrical and Electronic Engineers/Computer Society (IEEE/CS) and the Association for...

Standard Handbook of Petroleum and Natural Gas Engineering: Volume 1
Standard Handbook of Petroleum and Natural Gas Engineering: Volume 1

This petroleum and natural gas engineering two-volume handbook is written in the spirit of the classic handbooks of other engineering disciplines. The two volumes reflect the importance of the industry its engineers serve (i.e., Standard and Poor's shows that the fuels sector is the largest single entity in the gross domestic...

Algorithms in Bioinformatics
Algorithms in Bioinformatics

The present volume is dedicated to aspects of algorithmic work in bioinformat ics and computational biology with an emphasis on string algorithms that play a central role in the analysis of biological sequences. The papers included are a selection of articles corresponding to talks given at one of two meetings spon sored by The Royal...

Handbook of Open Source Tools
Handbook of Open Source Tools

The constant and speedy progress made by humankind in the industrial revolution, and more recently in the information technology era can be directly attributed to sharing of knowledge between various disciplines, reuse of the knowledge as science and technology advanced, and inclusion of this knowledge in the curriculum. The phrases...

Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench
Algorithms in Modern Mathematics and Computer Science: Proceedings, Urgench

Some TIME ago a group of mathematicians and computer scientists (including the editors of this volume) thought of making a scientific pilgrimage to the birthplace of al-Khw&rizmf, the outstanding ninth-century mathematician who gave his name to the word "algorithm". As his name indicates, al-Khwarizmi came from the Khorezm...

Algorithms for Approximation: Proceedings of the 5th International Conference, Chester, July 2005
Algorithms for Approximation: Proceedings of the 5th International Conference, Chester, July 2005

Approximation methods are of vital importance in many challenging applications from computational science and engineering. This book collects papers from world experts in a broad variety of relevant applications of approximation theory, including pattern recognition and machine learning, multiscale modelling of fluid flow, metrology,...

Springer Handbook of Mechanical Engineering
Springer Handbook of Mechanical Engineering

Mechanical engineering is a broad and complex field within the world of engineering and has close relations to many other fields. It is an important economic factor for all industrialized countries and the global market allows for wide international competition for products and processes in this field. To stay up to date with...

Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime
Home Security Handbook, The: How to Keep Your Home and Family Safe from Crime

We all know that society is less than perfect and that crime could easily touch us all. If yon talk to friends and neighbours you will usually find that most of them have cither been the victim of crime or know somebody who has. People tear crime, they feel helpless because they think that there is nothing they can do to protect themselves,...

Securing the Smart Grid: Next Generation Power Grid Security
Securing the Smart Grid: Next Generation Power Grid Security

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing the grid as well as consumers looking to implement the technology!."-- Dr. Patrick Engebretson, Assistant Professor of...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

Universal Access in Human-Computer Interaction. Users Diversity: 6th International Conference
Universal Access in Human-Computer Interaction. Users Diversity: 6th International Conference

The 14th International Conference on Human–Computer Interaction, HCI International 2011, was held in Orlando, Florida, USA, July 9–14, 2011, jointly with the Symposium on Human Interface (Japan) 2011, the 9th International Conference on Engineering Psychology and Cognitive Ergonomics, the 6th International Conference on...

Result Page: 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy