for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers.
Bemærk: Kan ikke leveres før jul.
Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements.
Bemærk: Kan ikke leveres før jul.
This book focuses on the problem of video streaming over emerging cognitive radio (CR) networks. The book discusses the... Læs mere
Bemærk: Kan ikke leveres før jul.
Advanced DPA Theory and Practice provides a thorough survey of new physical leakages of embedded systems, namely... Læs mere
Bemærk: Kan ikke leveres før jul.
This publication addresses distributed embedded smart cameras –cameras that perform on board analysis and collaborate with other cameras.
Bemærk: Kan ikke leveres før jul.
Each chapter will cover a relevant, timely, topic with two focuses: a first part which is of tutorial and survey nature, reviews the state of the art in that topic, followed by a more deep treatment including current research topics, case studies and performance analysis.
Bemærk: Kan ikke leveres før jul.
This book presents a range of cloud computing security challenges and promising solution paths. In Chapter 2, Chen and Sion present a dollar cost model of cloud computing and... Læs mere
Bemærk: Kan ikke leveres før jul.
This book serves as a starting point for people looking for a deeper principled understanding of REST, its applications, its limitations, and current research work in the area and as an architectural style.
Bemærk: Kan ikke leveres før jul.
Based on the most recent developments in the ?eld of wireless techno- gies related to WLAN, WPAN, wireless sensor networks (WSN) and wireless metropolitan... Læs mere
Bemærk: Kan ikke leveres før jul.
The end of the Cold War, the Revolution in Military Affairs, 9/11 and the War on Terror have radically altered the nature of conflict and security... Læs mere
Bemærk: Kan ikke leveres før jul.
This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. describes simulations of... Læs mere
Bemærk: Kan ikke leveres før jul.
This book responds to the growing need to secure critical infrastructure by creating a starting place for new researchers in secure telecommunications networks. It discusses securing current and next generation telecommunications networks.