0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (124)
  • R250 - R500 (376)
  • R500+ (2,274)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.): Sumit Ghosh, Elliot Turrini Cybercrimes: A Multidisciplinary Analysis (Paperback, 2011 ed.)
Sumit Ghosh, Elliot Turrini
R5,181 Discovery Miles 51 810 Ships in 18 - 22 working days

Designed to serve as a reference work for practitioners, academics, and scholars worldwide, this book is the first of its kind to explain complex cybercrimes from the perspectives of multiple disciplines (computer science, law, economics, psychology, etc.) and scientifically analyze their impact on individuals, society, and nations holistically and comprehensively. In particular, the book shows: How multiple disciplines concurrently bring out the complex, subtle, and elusive nature of cybercrimes How cybercrimes will affect every human endeavor, at the level of individuals, societies, and nations How to legislate proactive cyberlaws, building on a fundamental grasp of computers and networking, and stop reacting to every new cyberattack How conventional laws and traditional thinking fall short in protecting us from cybercrimes How we may be able to transform the destructive potential of cybercrimes into amazing innovations in cyberspace that can lead to explosive technological growth and prosperity

Practical Studies in E-Government - Best Practices from Around the World (Paperback, 2011 ed.): Said Assar, Imed Boughzala,... Practical Studies in E-Government - Best Practices from Around the World (Paperback, 2011 ed.)
Said Assar, Imed Boughzala, Isabelle Boydens
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

Information and communication technology (ICT) is permeating all aspects of service management; in the public sector, ICT is improving the capacity of government agencies to provide a wide array of innovative services that benefit citizens. E-Government is emerging as a multidisciplinary field of research based initially on empirical insights from practice. Efforts to theoretically anchor the field have opened perspectives from multiple research domains, as demonstrated in Practical Studies in E-Government. In this volume, the editors and contributors consider the evolution of the e-government field from both practical and research perspectives. Featuring in-depth case studies of initiatives in eight countries, the book deals with such technology-oriented issues as interoperability, prototyping, data quality, and advanced interfaces, and management-oriented issues as e-procurement, e-identification, election results verification, and information privacy. The book features best practices, tools for measuring and improving performance, and analytical methods for researchers.

ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012,... ICT Critical Infrastructures and Society - 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, Amsterdam, The Netherlands, September 27-28, 2012, Proceedings (Paperback, 2012 ed.)
Magda David Hercheui, Diane Whitehouse, William McIver Jr, Jackie Phahlamohlaka
R2,684 Discovery Miles 26 840 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th IFIP TC 9 International Conference on Human Choice and Computers, HCC10 2012, held in Amsterdam, The Netherlands, in September 2012. The 37 revised full papers presented were carefully reviewed and selected for inclusion in the volume. The papers are organized in topical sections on national and international policies, sustainable and responsible innovation, ICT for peace and war, and citizens' involvement, citizens' rights and ICT.

Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback,... Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013, Proceedings (Paperback, 2013 ed.)
Willy Susilo, Reza Reyhanitabar
R1,425 Discovery Miles 14 250 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Conference on Provable Security, ProvSec 2013, held in Melaka, Malaysia, in October 2013. The 18 full papers presented together with 1 invited talk were carefully reviewed and selected from 44 submissions. The papers cover the following topics: key exchange protocols, security models, signature and signcryption schemes, authenticated encryption, theory, and public key encryption.

Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany,... Detection of Intrusions and Malware, and Vulnerability Assessment - 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings (Paperback, 2013 ed.)
Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
R1,828 Discovery Miles 18 280 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2013, held in Berlin, Germany, in July 2013. The 9 revised full papers presented together with 3 short papers were carefully reviewed and selected from 38 submissions. The papers are organized in topical sections on malware; network security, Web security; attacks and defenses; and host security.

Algorithmic Game Theory - 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 -- October 2, 2014, Proceedings... Algorithmic Game Theory - 7th International Symposium, SAGT 2014, Haifa, Israel, September 30 -- October 2, 2014, Proceedings (Paperback, 2014 ed.)
Ron Lavi
R2,185 Discovery Miles 21 850 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Algorithmic Game Theory, SAGT 2014, held in Haifa, Israel, in October 2014. The 24 full papers and 5 short papers presented were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as matching theory, game dynamics, games of coordination, networks and social choice, markets and auctions, price of anarchy, computational aspects of games, mechanism design and auctions.

Information Systems: People, Organizations, Institutions, and Technologies - ItAIS:The Italian Association for Information... Information Systems: People, Organizations, Institutions, and Technologies - ItAIS:The Italian Association for Information Systems (Paperback, 2010 ed.)
Alessandro D'Atri, Domenico Sacca
R4,095 Discovery Miles 40 950 Ships in 18 - 22 working days

1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'1 2 D. Avison andS. Conger Wewerehonoredtobeaskedtoopenthe5thConferenceoftheItalianChapterof theAssociationforInformationSystems(ItAIS)inPariswhichtookplaceovertwo daysinDecember2008. Thegoalofthechapteristopromotetheexchangeof ideas,experiences,andknowledgeamongscholarsandprofessionalsengagedin thedevelopment,management,anduseofinformationandcommunicationss- temsandtechnology. Thisconferencewasoneofaround30conferences,consortia andworkshopsthattookplaceimmediatelybeforetheInternationalConferencein InformationSystems(ICIS2008). AsPresidentoftheAISandtheVice-PresidentAISforChaptersandSpecial InterestGroups,wewereparticularlydelightedtoparticipateastheItalianChapter oftheAIShasprovensosuccessful. Howeverwewerenotreadyfortheexcellent attendance and outstanding presentations that are re?ected in this volume that represents the best of the conference. Further, the conference highlighted both researchandpractice. Toooften,conferencesinISdonotevidencetheimpactof research on practice. The conference chairs, Alessandro D'Atri and Domenico ' Sacca,alongwiththeorganizingandprogramcommittees,deserveourgratitude forthesuccessoftheeventandtheexcellenceofthisvolume. TheconferencetracksthatincludedE-ServicesinPublicandPrivateSectors, Governance,MetricsandEconomicsofIT,InformationandKnowledgeMana- ment,ISDevelopmentandDesignMethodologies,ISTheoryandResearchMe- odologies,LegalandethicalaspectsofIS,NewthemesandfrontiersinISStudies, Organizational change and Impact of IT, Human Computer Interaction and the StrategicroleofIS,notonlyprovideacrosssectionofItalianresearchinISbut researchinISmoregenerally. Itiscommonthatourresearchinformsourcla- rooms,andifthisconferenceisanyevidence,ItalianITprogramsshould?ourish. ItisimportantfortheAISthatregionalandcountrygroupsarefosteredandgrow asthishelpstoensurethatthedisciplinedevelopsnewideasandisin?uencedby diverseresearchandscholarshipcontributions. TheItalianchapterisamodelfor 1 PresidentoftheAIS2008-2009,ESSECBusinessSchool,France,avi-son@essec. fr 2 AISVicePresidentSIGsandChapters2007-2010,UniversityofDallas,USA,sconger@aol. com v vi Foreword chaptersuccessandwehopetheItalianchaptercanhelpleadthewayindeveloping regionalgroupsaswell. Inexaminingthisvolume,thereadermightaskwhether thereissomethingdifferentaboutItalianresearchand,moregenerally,research fromtheMediterraneanarea(thereisafourthMediterraneanConferenceinInf- mationSystems(MCIS)inAthensinOctober2009). Thisvolumeofpapersisa goodplacetostartansweringthatquestion. Contents Introduction...1 AlessandroD'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandDomenicoSacca' PartI E-ServicesinPublicandPrivateSectors InformationTechnology,MarketingandOrganizationalFactor inCorporatee-banking:AQualitativeResearch ...7 DanielaPettinao TheRoleofCustomerInvolvementinLibraryE?services ...15 AdaScupolaandHanneWesthNicolajsen TechnologyasaToolofTransformation:e-Cities andtheRuleofLaw ...23 JohnM. EgerandAndreaMaggipinto UserRealitiesandtheFutureofe-governmentServices ...31 KonstadinosKutsikosandGerasimosKontos TheUseofWebServicesforInclusiveDecisionProcess: TowardstheEnhancementofe-Democracy ...39 FrancescaCabiddu TheChallengesofe-governmentEvaluation ...49 MaddalenaSorrentino IntegrationofDifferentOrganizationsandStakeholders inE-servicesDesignandImplementation:theCase oftheSpiderCard ...5 7 MariaChiaraDiGuardoandIoneZuccarello vii viii Contents B2GElectronicInvoicingasEnforcedHighImpact Service:OpenIssues...65 PietroLucaAgostiniandRaffaellaNaggi NetworkOutcomeasTriggerfortheEvolutionofaDesign Network:CoordinationProcessesBetweenActors andObjects...73 FrancescoBoliciandFrancescoVirili GovernanceandOrganizationalAspectsofanExperimental GroupwareintheItalianPublicAdministrationtoSupport Multi-InstitutionalPartnerships...81 NunzioCasalinoandMauroDraoli BusinessProcessModellingWithintheCycleofContinuous Improvement ...91 LindaPacicco,AurelioRavarini,andFedericoPigni InformationExtractionfromMultimediaDocuments fore-GovernmentApplications...101 F. Amato,A. Mazzeo,V. Moscato,andA. Picariello PartII Governance,MetricsandEconomicsofIT OperationsStrategyofSmallSoftwareFirmsUsingOpen SourceSoftware...111 BernhardGlatt,AlbertoSillitti,andGiancarloSucci ITValueinPublicAdministrations:AModelProposal fore-Procurement ...121 AlessioMariaBracciniandTommasoFederici ValueAssessmentofEnterpriseContentManagement Systems:AProcess-OrientedApproach ...131 J. vomBrocke,A. Simons,C. Sonnenberg,P. L. Agostini,andA. Zardini AMaintenanceMetricModelforOpenSourceGovernance ...1 39 PasqualeArdimento,GiovanniBruno,DaniloCaivano,andMartaCimitile KeyPerformanceIndicatorstoRelateKnowledge GovernancewithKnowledgeProcess ...147 P. Ardimento,M. T. Baldassarre,M. Cimitile,andG. Mastelloni Contents ix MeasuringDataQualityWhenApplyingDataSwappingand Perturbation...157 G. CanforaandC. A. Visaggio VirtualEnterpriseTransactions:ACostModel ...165 A. D'AtriandA. Motro PartIII InformationandKnowledgeManagement EffectiveStorageofSemanticWebData...177 RobertoDeVirgilio,PierluigiDelNostro,GiorgioGianforme, StefanoPaolozzi,andRiccardoTorlone AReferenceArchitectureforSemanticKnowledge Coordination ...185 S. Castano,A. Ferrara,andS. Montanelli Service-BasedNetworkedCollaboration...195 DevisBianchini,ValeriaDeAntonellis,andMicheleMelchiori HowtoExploitDataMiningWithoutBecomingAwareofit ...203 N. Ciaramella,andA. Albano AMethodologicalApproachtoEnableCooperative ProcessDesignThroughWebServices...211 D. Bianchini,C. Cappiello,V. DeAntonellis,andB. Pernici TowardanEffectiveandEf?cientQueryProcessing intheNeP4BProject ...

The RFID Roadmap: The Next Steps for Europe (Hardcover, 2008 ed.): Gerd Wolfram, Birgit Gampl, Peter Gabriel The RFID Roadmap: The Next Steps for Europe (Hardcover, 2008 ed.)
Gerd Wolfram, Birgit Gampl, Peter Gabriel
R2,663 Discovery Miles 26 630 Ships in 18 - 22 working days

RFID is a key technology for Europe. Today there is a noticeable shift away from the days of RFID pilot projects, and towards a time where organisations are looking to RFID to drive efficiency and innovation. Although Europe is a leading player in the world of RFID technology, several challenges which are preventing RFID from reaching its full potential need to be addressed.

To further the advancement of this technology, coordinated European efforts need to be promoted, specifically in the areas of standardisation, user guidelines, legislation, technology development, and research and development. These themes have been analysed, and clear recommendations have been derived, stating what the different RFID stakeholders can do to support the technology. This book is aimed at decision makers in all fields of society, e.g. in companies, politics, business associations, etc.

The publication is a summary of the results of the coordination action CE RFID - "Coordinating European Efforts in the RFID Value Chain" - and is a network of European RFID technology providers, vendors and end users. It aims at promoting the use of RFID technology and supporting further development. The project was funded by the European Commission under the 6th Framework Programme.

Digital Communities in a Networked Society - e-Commerce, e-Business and e-Government (Paperback, Softcover reprint of the... Digital Communities in a Networked Society - e-Commerce, e-Business and e-Government (Paperback, Softcover reprint of the original 1st ed. 2004)
Manuel J. Mendes, Reima Suomi, Carlos Passos
R2,702 Discovery Miles 27 020 Ships in 18 - 22 working days

Digital Communities in a Networked Society: e-Commerce, e-Business and e-Government deals with the accelerating evolution in the computerization of society. This evolution, or should we call it a revolution, is dominantly driven by the Internet, and documented by the novelties introduced, year by year, by Information and Communication Technologies. The book contains recent results of research and development in the areas of: -E-government, -Business models of e-applications, -Innovative structures in the internet, -Auctions and e-payment, -Future aspects of communication, -Internet and the web, -Advanced platforms and grid computing, -Cooperation and integration, -Modeling and construction of e-services.

Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings... Security and Trust Management - 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings (Paperback, 2014 ed.)
Sjouke Mauw, Christian Damsgaard Jensen
R1,941 Discovery Miles 19 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.

Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security... Advances in Network and Distributed Systems Security - IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26-27, 2001, Leuven, Belgium (Paperback, Softcover reprint of the original 1st ed. 2002)
Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
R3,991 Discovery Miles 39 910 Ships in 18 - 22 working days

The first Annual Working Conference ofWG11.4oftheInter nationalFederationforInformation Processing (IFIP),focuseson variousstate of the art concepts in the field of Network and Dis tributedSystemsSecurity. Oursocietyisrapidly evolvingand irreversibly set onacourse governedby electronicinteractions. Wehave seen thebirthofe mail in the early seventies, and are now facing new challenging applicationssuchase commerce, e government,...Themoreour societyrelies on electronicforms ofcommunication,themorethe securityofthesecommunicationnetworks isessentialforitswell functioning. Asaconsequence,researchonmethodsandtechniques toimprove network security iso fparam ount importance. ThisWorking Conference bringstogetherresearchersandprac tionersofvariousdisciplines,organisationsandcountries,todiscuss thelatestdevelopmentsinsecurity protocols, secure software engin eering,mobileagentsecurity,e commercesecurityandsecurityfor distributedcomputing. Wearealsopleasedtohaveattractedtwointernationalspeakers topresenttwo case studies,one dealing withBelgium'sintentionto replacetheidentity card ofitscitizensbyanelectronicversion,and theotherdiscussingtheimplicationsofthesecuritycertificationin amultinationalcorporation. ThisWorking Conference s houldalsobeconsideredasthekick off activity ofWG11.4, the aimsof which can be summarizedas follows: topromoteresearch on technical measures forsecuringcom puternetworks, including bothhardware andsoftware based techniques. to promote dissemination of research results in the field of network security in real lifenetworks in industry, academia and administrative ins titutions. viii topromoteeducationintheapplicationofsecuritytechniques, andtopromotegeneral awarenessa boutsecurityproblems in thebroadfieldofinformationtechnology. Researchers and practioners who want to get involved in this Working Group, are kindlyrequestedtocontactthechairman. MoreinformationontheworkingsofWG11.4isavailable from the officialIFIP website:http://www.ifip.at.org/. Finally,wewish toexpressour gratitudetoallthosewho have contributedtothisconference in one wayoranother. Wearegr ate fultothe internationalrefereeboard whoreviewedallthe papers andtotheauthorsandinvitedspeakers,whosecontributionswere essential to the successof the conference. We would alsoliketo thanktheparticipantswhosepresenceand interest, togetherwith thechangingimperativesofsociety,willprovea drivingforce for futureconferencestocome.

Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014,... Privacy Enhancing Technologies - 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014, Proceedings (Paperback, 2014 ed.)
Emiliano De Cristofaro, Steven J. Murdoch
R2,269 Discovery Miles 22 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 14th International Symposium on Privacy Enhancing Technologies, PETS 2014, held in Amsterdam, The Netherlands, in July 2014.The 16 full papers presented were carefully selected from 86 submissions. Topics addressed by the papers published in these proceedings include study of privacy erosion, designs of privacy-preserving systems, censorship resistance, social networks and location privacy."

Mobile Web Information Systems - 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings... Mobile Web Information Systems - 11th International Conference, MobiWIS 2014, Barcelona, Spain, August 27-29, 2014. Proceedings (Paperback, 2014 ed.)
Irfan Awan, Muhammad Younas, Xavier Franch, Carme Quer
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 11th International Conference on Mobile Web and Information Systems, MobiWIS 2014, held in Barcelona, Spain, in August 2014. The 24 papers presented were carefully reviewed and selected from 75 submissions and cover topics such as: mobile software systems, middleware/SOA for mobile systems, context- and location-aware services, data management in the mobile web, mobile cloud services, mobile web of things, mobile web security, trust and privacy, mobile networks, protocols and applications, mobile commerce and business services, HCI in mobile applications, social media, and adaptive approaches for mobile computing.

Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the... Mobile Computing - Implementing Pervasive Information and Communications Technologies (Paperback, Softcover reprint of the original 1st ed. 2002)
Shambhu Upadhyaya, Abhijit Chaudhury, Kevin Kwiat, Mark Weiser
R2,637 Discovery Miles 26 370 Ships in 18 - 22 working days

Mobil Computing: Implementing Pervasive Information and Communication Technologies is designed to address some of the business and technical challenges of pervasive computing that encompass current and emerging technology standards, infrastructures and architectures, and innovative and high impact applications of mobile technologies in virtual enterprises. The various articles examine a host of issues including: the challenges and current solutions in mobile connectivity and coordination; management infrastructures; innovative architectures for fourth generation wireless and Ad-hoc networks; error-free frequency assignments for wireless communication; cost-effective wavelength assignments in optical communication networks; data and transaction modeling in a mobile environment, and bandwidth issues and data routing in mobile Ad-hoc networks.

Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected... Frontiers in Internet Technologies - Second CCF Internet Conference of China, ICoC 2013, Zhangjiajie, China. Revised Selected Papers (Paperback, 2013 ed.)
Jinshu Su, Zhigang Sun, Baokang Zhao, Xiaofeng Wang, Fei Wang
R2,132 Discovery Miles 21 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second CCF Internet Conference of China, ICoC 2013, held in Zhangjiajie, China, in July 2013. The 24 revised full papers presented were carefully reviewed and selected from 63 submissions. The papers address issues such as future Internet architecture, Internet routing, network security, network management, data center networks, green networks, wireless networks, P2P networks, mobile Internet and the Internet of Things.

Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences... Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013, Proceedings (Paperback, 2013 ed.)
David Basin, John C. Mitchell
R1,411 Discovery Miles 14 110 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems.

Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012,... Web Information Systems and Technologies - 8th International Conference, WEBIST 2012, Porto, Portugal, April 18-21, 2012, Revised Selected Papers (Paperback, 2013 ed.)
Jose Cordeiro, Karl-Heinz Krempels
R1,436 Discovery Miles 14 360 Ships in 18 - 22 working days

This book contains the thoroughly refereed and revised best papers from the 8th International Conference on Web Information Systems and Technologies, WEBIST 2012, held in Porto, Portugal, in April 2012, and organized by the Institute for Systems and Technologies of Information, Control and Communication (INSTICC), in collaboration with ACM SIGMIS.

The 23 papers presented in this book were carefully reviewed and selected from 184 submissions. The papers were selected from those with the best reviews also taking into account the quality of their presentation at the conference. The papers are grouped into parts on Internet Technology; Web Interfaces and Applications; Society, e-Business, and e-Government; Web Intelligence; and Mobile Information Systems.

Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25-... Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Paperback, 2013 ed.)
Ed Dawson
R1,441 Discovery Miles 14 410 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Paperback, Softcover reprint of the original 1st ed. 2000)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,173 Discovery Miles 51 730 Ships in 18 - 22 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings... Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (Paperback, 2014 ed.)
Carles Padro
R2,079 Discovery Miles 20 790 Ships in 18 - 22 working days

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Agent Based Simulation for a Sustainable Society and Multiagent Smart Computing - International Workshops, PRIMA 2011,... Agent Based Simulation for a Sustainable Society and Multiagent Smart Computing - International Workshops, PRIMA 2011, Wollongong, Australia, November 14, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Stephen Cranefield, Insu Song
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November. The workshops were, Workshop on Agent Based Simulation for a Sustainable Society (ABSSS 2011) and International Workshop on Multi-Agent Smart Computing (MASmart 2011). The 8 papers presented were carefully reviewed and selected from various submissions. The papers cover topics from agent based simulation for a sustainable society and on multi-agent smart computing.

Information and Communication Technologies in Tourism 2014 - Proceedings of the International Conference in Dublin, Ireland,... Information and Communication Technologies in Tourism 2014 - Proceedings of the International Conference in Dublin, Ireland, January 21-24, 2014 (Paperback, 2013 ed.)
Zheng Xiang, Iis Tussyadiah
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

The papers presented in this volume advance the state-of-the-art research on social media and Web 2.0, electronic tourism marketing, website development and evaluation, search engine marketing and optimization, IT adoption and diffusion, virtual travel communities, mobile technologies, management information systems in tourism, eLearning, recommender systems for tourism businesses and destinations and electronic distribution for hospitality and travel products. This book covers the most significant topics contributed by prominent scholars from around the world and is suitable for both academics and practitioners who are interested in the latest developments in e-Tourism.

Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback,... Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback, 2013 ed.)
Berthold Voecking
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.

Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003): Alvin T. S. Chan, Stephen Chan,... Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003)
Alvin T. S. Chan, Stephen Chan, Hong Va Leong, Vincent Ng
R4,005 Discovery Miles 40 050 Ships in 18 - 22 working days

The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Fine Print - Dreamland Billionaires…
Lauren Asher Paperback  (3)
R295 R264 Discovery Miles 2 640
How to play the position of Loose-lock…
Chris Miles Paperback R373 Discovery Miles 3 730
Kiss The Villain - Villain: Book 1
Rina Kent Paperback R295 R263 Discovery Miles 2 630
A Very Tall Story
Martin Bayfield Hardcover R576 R517 Discovery Miles 5 170
Kneel
Dani Rene Paperback R620 Discovery Miles 6 200
Droomjagter
Leon van Nierop Paperback R340 R304 Discovery Miles 3 040
Bonds of Cupidity - Heart Hassle: Book 2
Raven Kennedy Paperback R275 R246 Discovery Miles 2 460
Horsemen
Joseph Bean Paperback R412 Discovery Miles 4 120
My Life And Rugby - The Autobiography
Eddie Jones Paperback  (1)
R422 Discovery Miles 4 220
Glory Game - The Joost van der…
Joost Van Der Westhuizen, Odette Schwegler Paperback  (5)
R180 R161 Discovery Miles 1 610

 

Partners