Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.
Bemærk: Kan ikke leveres før jul.
This comprehensive handbook serves as a professional reference and practitioner’s guide to today’s most complete and concise view of private cloud security. It explores... Læs mere
Bemærk: Kan ikke leveres før jul.
The future of Internet security does not lie in doing more of the same. It requires not only a new architecture, but the means of securing... Læs mere
Bemærk: Kan ikke leveres før jul.
This book, written for practitioners in the field, provides tangible, cost effective, and thus pragmatic means to mitigate key risks while leveraging built-in cloud capabilities and overarching principles of effective system design.
Bemærk: Kan ikke leveres før jul.
This book constitutes the proceedings of the Third Workshop on Video... Læs mere
Bemærk: Kan ikke leveres før jul.
This book constitutes the refereed proceedings of the Third International Symposium on Ubiquitous Networking, UNet 2017, held in Casablanca, Morocco, in May 2017. The 56 full papers presented in this volume were carefully reviewed and selected from 127 submissions.
Bemærk: Kan ikke leveres før jul.
This book constitutes the thoroughlyrefereed post-conference proceedings of the 10th International Symposium onTrustworthy Global Computing, TGC 2015, held in Madrid, Spain, in August/September2015.
Bemærk: Kan ikke leveres før jul.