for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
The two volume-set, LNCS 8042 and LNCS 8043, constitutes the refereed... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference on Availability, Reliability and Security, CD-ARES 2013, held in Regensburg, Germany, in September 2013.
Bemærk: Kan ikke leveres før jul.
Scientists from management and strategy, information systems, engineering and telecommunications have discussed a novel concept: Smart Business Networks. The technical answer is... Læs mere
Bemærk: Kan ikke leveres før jul.
At its core, information security deals with the secure and accurate transfer of information.
Bemærk: Kan ikke leveres før jul.
With the given work we decided to help not only the readers but ourselves, as the professionals who actively involved in the... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughly refereed post-proceedings of the 12th... Læs mere
Bemærk: Kan ikke leveres før jul.
Exploratory data analysis (EDA) is about detecting and describing patterns, trends, and relations in data, motivated by certain purposes of investigation.
Bemærk: Kan ikke leveres før jul.
This book covers the management of information security, the economics of information security, the economics of privacy, and the economics of cybercrime.
Bemærk: Kan ikke leveres før jul.
The introduction of public key cryptography (PKC) was a critical advance in IT security. Although PKC does not require the confidential exchange of secret... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book provides an overview of neural information processing research, which is one of the most important branches of neuroscience today.