Bemærk: Kan ikke leveres før jul.
This book focuses on the best practices and simplest software methods and mechanisms that allow the i3-MARKET backplane reference implementation to be instantiated, tested and validated.
Bemærk: Kan ikke leveres før jul.
The book combines a concise, accessible style with penetrating cultural and theological analysis. Building on the work of Marshall... Læs mere
Bemærk: Kan ikke leveres før jul.
This book presents essential principles, technical information, and expert insights on multimedia security technology. It also serves as an instructional tool on the fundamental theoretical framework required for the development of advanced techniques.
Bemærk: Kan ikke leveres før jul.
Enterprise Level Security 2: Advanced Topics in an Uncertain World follows on from the authors’ first... Læs mere
Bemærk: Kan ikke leveres før jul.
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on... Læs mere
Bemærk: Kan ikke leveres før jul.
Many applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house... Læs mere
Bemærk: Kan ikke leveres før jul.
Posthuman Gaming: Avatars, Gamers, and Entangled Subjectivities explores the relationship between avatar and gamer in the massively... Læs mere
Bemærk: Kan ikke leveres før jul.
This book develops a relational, situated approach to algorithms.
Bemærk: Kan ikke leveres før jul.
In view of the ever-increasing use of interactive and emerging technologies in museum spaces, Museums and Technologies of Presence rethinks the role of such... Læs mere
Bemærk: Kan ikke leveres før jul.
This book explains the content, purpose and use of the eight standard knowledge areas... Læs mere
Bemærk: Kan ikke leveres før jul.
Covering the diverse realms that chief officers need to know and the specifics applicable to singular areas of departmental responsibility, this book provides both the strategic vision and action steps needed to prevent the exploitation of IT security gaps
Bemærk: Kan ikke leveres før jul.
This book offers new data in the field of Systemic-Structural Activity Theory (SSAT). It includes unpublished data and... Læs mere