0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (125)
  • R250 - R500 (372)
  • R500+ (2,277)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer software packages > General

Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on... Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings (Paperback, 2014 ed.)
Martin Abadi, Steve Kremer
R2,227 Discovery Miles 22 270 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the Third International Conference on Principles of Security and Trust, POST 2014, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, in April 2014. The 15 papers presented in this volume were carefully reviewed and selected from 55 submissions. They are organized in topical sections named: analysis of cryptographic protocols; quantitative aspects of information flow; information flow control in programming languages; cryptography in implementations and policies and attacks.

Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced... Smart Card Research and Advanced Applications - IFIP TC8 / WG8.8 Fourth Working Conference on Smart Card Research and Advanced Applications September 20-22, 2000, Bristol, United Kingdom (Paperback, Softcover reprint of the original 1st ed. 2000)
Josep Domingo-Ferrer, David Chan, Anthony Watson
R5,173 Discovery Miles 51 730 Ships in 18 - 22 working days

Smart cards or IC cards offer a huge potential for information processing purposes. The portability and processing power of IC cards allow for highly secure conditional access and reliable distributed information processing. IC cards that can perform highly sophisticated cryptographic computations are already available. Their application in the financial services and telecom industries are well known. But the potential of IC cards go well beyond that. Their applicability in mainstream Information Technology and the Networked Economy is limited mainly by our imagination; the information processing power that can be gained by using IC cards remains as yet mostly untapped and is not well understood. Here lies a vast uncovered research area which we are only beginning to assess, and which will have a great impact on the eventual success of the technology. The research challenges range from electrical engineering on the hardware side to tailor-made cryptographic applications on the software side, and their synergies. This volume comprises the proceedings of the Fourth Working Conference on Smart Card Research and Advanced Applications (CARDIS 2000), which was sponsored by the International Federation for Information Processing (IFIP) and held at the Hewlett-Packard Labs in the United Kingdom in September 2000. CARDIS conferences are unique in that they bring together researchers who are active in all aspects of design of IC cards and related devices and environments, thus stimulating synergy between different research communities from both academia and industry. This volume presents the latest advances in smart card research and applications, and will be essential reading for smart card developers, smart card application developers, and computer science researchers involved in computer architecture, computer security, and cryptography.

Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings... Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (Paperback, 2014 ed.)
Carles Padro
R2,079 Discovery Miles 20 790 Ships in 18 - 22 working days

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Agent Based Simulation for a Sustainable Society and Multiagent Smart Computing - International Workshops, PRIMA 2011,... Agent Based Simulation for a Sustainable Society and Multiagent Smart Computing - International Workshops, PRIMA 2011, Wollongong, Australia, November 14, 2011, Revised Selected Papers (Paperback, 2012 ed.)
Stephen Cranefield, Insu Song
R1,793 Discovery Miles 17 930 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the two workshops held at the 14th International Conference on Principles and Practice of Multi-Agent Systems, PRIMA 2011, held in Wollongong, Australia, in November. The workshops were, Workshop on Agent Based Simulation for a Sustainable Society (ABSSS 2011) and International Workshop on Multi-Agent Smart Computing (MASmart 2011). The 8 papers presented were carefully reviewed and selected from various submissions. The papers cover topics from agent based simulation for a sustainable society and on multi-agent smart computing.

Information and Communication Technologies in Tourism 2014 - Proceedings of the International Conference in Dublin, Ireland,... Information and Communication Technologies in Tourism 2014 - Proceedings of the International Conference in Dublin, Ireland, January 21-24, 2014 (Paperback, 2013 ed.)
Zheng Xiang, Iis Tussyadiah
R5,296 Discovery Miles 52 960 Ships in 18 - 22 working days

The papers presented in this volume advance the state-of-the-art research on social media and Web 2.0, electronic tourism marketing, website development and evaluation, search engine marketing and optimization, IT adoption and diffusion, virtual travel communities, mobile technologies, management information systems in tourism, eLearning, recommender systems for tourism businesses and destinations and electronic distribution for hospitality and travel products. This book covers the most significant topics contributed by prominent scholars from around the world and is suitable for both academics and practitioners who are interested in the latest developments in e-Tourism.

Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback,... Algorithmic Game Theory - 6th International Symposium, SAGT 2013, Aachen, Germany, October 21-23, 2013, Proceedings (Paperback, 2013 ed.)
Berthold Voecking
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Symposium on Algorithmic Game Theory, SAGT 2013, held in Aachen, Germany, in October 2013. The 25 papers presented in this volume were carefully reviewed and selected from 65 submissions. They cover various important aspects of algorithmic game theory, such as solution concepts in game theory, efficiency of equilibria and the price of anarchy, computational aspects of equilibria and game theoretical measures, repeated games and convergence of dynamics, evolution and learning in games, coordination and collective action, network games and graph-theoretic aspects of social networks, voting and social choice, as well as algorithmic mechanism design.

Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003): Alvin T. S. Chan, Stephen Chan,... Cooperative Internet Computing (Paperback, Softcover reprint of the original 1st ed. 2003)
Alvin T. S. Chan, Stephen Chan, Hong Va Leong, Vincent Ng
R4,005 Discovery Miles 40 050 Ships in 18 - 22 working days

The Second International Workshop on Cooperative Internet Computing (CIC2002) has brought together researchers, academics, and industry practitioners who are involved and interested in the development of advanced and emerging cooperative computing technologies. Cooperative computing is an important computing paradigm to enable different parties to work together towards a pre defined non-trivial goal. It encompasses important technological areas like computer supported cooperative work, workflow, computer assisted design and concurrent programming. As technologies continue to advance and evolve, there is an increasing need to research and develop new classes of middlewares and applications to leverage on the combined benefits of Internet and web to provide users and programmers with highly interactive and robust cooperative computing environment. It is the aim of this forum to promote close interactions and exchange of ideas among researchers, academics and practitioners on the state-of-the art researches in all of these exciting areas. We have partnered with Kluwer Acedamic Press this year to bring to you a book compilation of the papers that were presented at the CIC2002 workshop. The importance of the research area is reflected both in the quality and quantity of the submitted papers, where each paper was reviewed by at least three PC members. As a result, we were able to only accept 14 papers for full presentation at the workshop, while having to reject several excellent papers due to the limitations of the program schedule.

Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004): Godfried B. Williams Synchronizing E-Security (Paperback, Softcover reprint of the original 1st ed. 2004)
Godfried B. Williams
R2,605 Discovery Miles 26 050 Ships in 18 - 22 working days

Synchronizing E-Security is a critical investigation and empirical analysis of studies conducted among companies that support electronic commerce transactions in both advanced and developing economies. This book presents insights into the validity and credibility of current risk assessment methods that support electronic transactions in the global economy. Synchronizing E-Security focuses on a number of case studies of IT companies, within selected countries in West Africa, Europe, Asia and the United States. The foundation of this work is based on previous studies by Williams G., Avudzivi P.V (Hawaii 2002) on the retrospective view of information security management and the impact of tele-banking on the end-user.

Human-Centered e-Business (Paperback, Softcover reprint of the original 1st ed. 2003): Rajiv Khosla, Ernesto Damiani, William... Human-Centered e-Business (Paperback, Softcover reprint of the original 1st ed. 2003)
Rajiv Khosla, Ernesto Damiani, William Grosky
R4,023 Discovery Miles 40 230 Ships in 18 - 22 working days

Human-Centered e-Business focuses on analysis, design and development of human-centered e-business systems. The authors illustrate the benefits of the human-centered approach in intelligent e-sales recruitment application, integrating data mining technology with decision support model for profiling transaction behavior of internet banking customers, user-centered context dependent data organization using XML, knowledge management, and optimizing the search process through human evaluation in an intelligent interactive multimedia application. The applications described in this work, facilitates both e-business analysis from a business professional's perspective, and human-centered system design from a system development perspective. These applications employ a range of internet and soft computing technologies.

Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001): Stefan Katzenbeisser Recent Advances in RSA Cryptography (Paperback, Softcover reprint of the original 1st ed. 2001)
Stefan Katzenbeisser
R2,616 Discovery Miles 26 160 Ships in 18 - 22 working days

Recent Advances in RSA Cryptography surveys the most important achievements of the last 22 years of research in RSA cryptography. Special emphasis is laid on the description and analysis of proposed attacks against the RSA cryptosystem. The first chapters introduce the necessary background information on number theory, complexity and public key cryptography. Subsequent chapters review factorization algorithms and specific properties that make RSA attractive for cryptographers. Most recent attacks against RSA are discussed in the third part of the book (among them attacks against low-exponent RSA, Hastad's broadcast attack, and Franklin-Reiter attacks). Finally, the last chapter reviews the use of the RSA function in signature schemes. Recent Advances in RSA Cryptography is of interest to graduate level students and researchers who will gain an insight into current research topics in the field and an overview of recent results in a unified way. Recent Advances in RSA Cryptography is suitable as a secondary text for a graduate level course, and as a reference for researchers and practitioners in industry.

Google Apps For Dummies (Paperback): R Teeter Google Apps For Dummies (Paperback)
R Teeter
R711 R640 Discovery Miles 6 400 Save R71 (10%) Ships in 18 - 22 working days

Google Apps are Web-based, low-cost (or free ) office productivity tools that do everything those expensive applications do -- and you can access them from any computer with an Internet connection. "Google Apps For Dummies" boosts your "app-titude" by giving you the low-down on choosing, setting up, and using these nifty and powerful gadgets for work or play.

Whether you're an individual who wants to take advantage of iGoogle or an organization looking for an enterprise-wide training solution for users at all levels, this comprehensive, practical guide brings you up to speed with all of the basic information and advanced tips and tricks you need to make good use of every Google Apps's tool and capability. Discover how to: Get productive fast with free or inexpensive Web-based appsDesign your perfect Start Page layoutChoose among the different editionsUse Gmail and Google TalkWork with Google Docs and spreadsheet documentsCreate and collaborate on documentsImport events into your calendarBuild dazzling presentationsUse Dashboard to create and manage user accountsCreate a Web page with a unique domain setting

Google Apps are poised to shatter the primacy of the current way of working with PCs, saving businesses, schools, government agencies, and individuals big bucks on software, network infrastructure, and administration. "Google Apps For Dummies" is your key to making this revolutionary new approach work for you and your organization.

Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed.... Distributed Infrastructure Support for Electronic Commerce Applications (Paperback, Softcover reprint of the original 1st ed. 2004)
Hans-Arno Jacobsen
R2,626 Discovery Miles 26 260 Ships in 18 - 22 working days

Distributed Infrastructure Support For E-Commerce And Distributed Applications is organized in three parts. The first part constitutes an overview, a more detailed motivation of the problem context, and a tutorial-like introduction to middleware systems. The second part is comprised of a set of chapters that study solutions to leverage the trade-off between a transparent programming model and application-level enabled resource control. The third part of this book presents three detailed distributed application case studies and demonstrates how standard middleware platforms fail to adequately cope with resource control needs of the application designer in these three cases: -An electronic commerce framework for software leasing over the World Wide Web; -A remote building energy management system that has been experimentally deployed on several building sites; -A wireless computing infrastructure for efficient data transfer to non-stationary mobile clients that have been experimentally validated.

Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3,... Information Security and Cryptology - 7th International Conference, Inscrypt 2011, Beijing, China, November 30 -- December 3, 2011. Revised Selected Papers (Paperback, 2012 ed.)
Chuankun Wu, Moti Yung, Dongdai Lin
R1,437 Discovery Miles 14 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications.

Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues  9th International Workshop, RFIDsec... Radio Frequency Identification: Security and Privacy Issues - Security and Privacy Issues 9th International Workshop, RFIDsec 2013, Graz, Austria, July 9-11, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Michael Hutter, Joern-Marc Schmidt
R1,754 Discovery Miles 17 540 Ships in 18 - 22 working days

This book constitutes the proceedings of the 9th Workshop on RFID Security and Privacy, RFIDsec 2013, held in Graz, Austria, in July 2013. The 11 papers presented in this volume were carefully reviewed and selected from 23 submissions. RFIDsec deals with topics of importance to improving the security and privacy of RFID, NFC, contactless technologies, and the Internet of Things. RFIDsec bridges the gap between cryptographic researchers and RFID developers.

The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.): Robert... The Internet of Products - An Approach to Establishing Total Transparency in Electronic Markets (Paperback, 2013 ed.)
Robert Neumann
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This study approaches the difficult problem of providing Internet users with a completely transparent view on electronic markets from a product information accessibility point of view. Robert Neumann analyzes economic, ecological, and societal gains of openly accessible product information in the form of theoretical models. Though many aspects of very different research disciplines have to be investigated to gain a holistic view on the Internet of Products, this thesis reduces the range of involved research topics to product information discoverability related questions."

Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings... Network and System Security - 6th International Conference, NSS 2012, Wuyishan, Fujian, China, November 21-23, Proceedings (Paperback, 2012 ed.)
Li Xu, Elisa Bertino, Yi Mu
R1,476 Discovery Miles 14 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 6th International Conference on Network and System Security, NSS 2012, held in Wuyishan, Fujian, China, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 173 submissions. The papers cover the following topics: network security, system security, public key cryptography, privacy, authentication, security analysis, and access control.

Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and... Information Hiding: Steganography and Watermarking-Attacks and Countermeasures - Steganography and Watermarking - Attacks and Countermeasures (Paperback, Softcover reprint of the original 1st ed. 2001)
Neil F. Johnson, Zoran Duric, Sushil Jajodia
R2,617 Discovery Miles 26 170 Ships in 18 - 22 working days

Information Hiding: Steganography and Watermarking - Attacks and Countermeasures deals with information hiding. With the proliferation of multimedia on the Internet, information hiding addresses two areas of concern: privacy of information from surveillance (steganography) and protection of intellectual property (digital watermarking). Steganography (literally, covered writing) explores methods to hide the existence of hidden messages. These methods include invisible ink, microdot, digital signature, covert channel, and spread spectrum communication. Digital watermarks represent a commercial application of steganography. Watermarks can be used to track the copyright and ownership of electronic media. In this volume, the authors focus on techniques for hiding information in digital media. They analyze the hiding techniques to uncover their limitations. These limitations are employed to devise attacks against hidden information. The goal of these attacks is to expose the existence of a secret message or render a digital watermark unusable. In assessing these attacks, countermeasures are developed to assist in protecting digital watermarking systems.Understanding the limitations of the current methods will lead us to build more robust methods that can survive various manipulation and attacks. The more information that is placed in the public's reach on the Internet, the more owners of such information need to protect themselves from theft and false representation. Systems to analyze techniques for uncovering hidden information and recover seemingly destroyed information will be useful to law enforcement authorities in computer forensics and digital traffic analysis. Information Hiding: Steganography and Watermarking - Attacks and Countermeasures presents the authors' research contributions in three fundamental areas with respect to image-based steganography and watermarking: analysis of data hiding techniques, attacks against hidden information, and countermeasures to attacks against digital watermarks. Information Hiding: Steganography and Watermarking -- Attacks and Countermeasures is suitable for a secondary text in a graduate level course, and as a reference for researchers and practitioners in industry.

Understanding High-Dimensional Spaces (Paperback, 2012 ed.): David B Skillicorn Understanding High-Dimensional Spaces (Paperback, 2012 ed.)
David B Skillicorn
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

High-dimensional spaces arise as a way of modelling datasets with many attributes. Such a dataset can be directly represented in a space spanned by its attributes, with each record represented as a point in the space with its position depending on its attribute values. Such spaces are not easy to work with because of their high dimensionality: our intuition about space is not reliable, and measures such as distance do not provide as clear information as we might expect.

There are three main areas where complex high dimensionality and large datasets arise naturally: data collected by online retailers, preference sites, and social media sites, and customer relationship databases, where there are large but sparse records available for each individual; data derived from text and speech, where the attributes are words and so the corresponding datasets are wide, and sparse; and data collected for security, defense, law enforcement, and intelligence purposes, where the datasets are large and wide. Such datasets are usually understood either by finding the set of clusters they contain or by looking for the outliers, but these strategies conceal subtleties that are often ignored. In this book the author suggests new ways of thinking about high-dimensional spaces using two models: a skeleton that relates the clusters to one another; and boundaries in the empty space between clusters that provide new perspectives on outliers and on outlying regions.

The book will be of value to practitioners, graduate students and researchers."

Dynamic Flexible Constraint Satisfaction and its Application to AI Planning (Paperback, Softcover reprint of the original 1st... Dynamic Flexible Constraint Satisfaction and its Application to AI Planning (Paperback, Softcover reprint of the original 1st ed. 2004)
Ian Miguel
R2,666 Discovery Miles 26 660 Ships in 18 - 22 working days

First, I would like to thank my principal supervisor Dr Qiang Shen for all his help, advice and friendship throughout. Many thanks also to my second supervisor Dr Peter Jarvis for his enthusiasm, help and friendship. I would also like to thank the other members of the Approximate and Qualitative Reasoning group at Edinburgh who have also helped and inspired me. This project has been funded by an EPSRC studentship, award num ber 97305803. I would like, therefore, to extend my gratitude to EPSRC for supporting this work. Many thanks to the staff at Edinburgh University for all their help and support and for promptly fixing any technical problems that I have had . My whole family have been both encouraging and supportive throughout the completion of this book, for which I am forever indebted. York, April 2003 Ian Miguel Contents List of Figures XV 1 Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1. 1 Solving Classical CSPs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1. 2 Applicat ions of Classical CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. 3 Limitations of Classical CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 1. 3. 1 Flexible CSP 6 1. 3. 2 Dynamic CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1. 4 Dynamic Flexible CSP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1. 5 Flexible Planning: a DFCSP Application . . . . . . . . . . . . . . . . . . 8 1. 6 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 1. 7 Contributions and their Significance 11 2 The Constraint Satisfaction Problem 13 2. 1 Constraints and Constraint Graphs . . . . . . . . . . . . . . . . . . . . . . . 13 2. 2 Tree Search Solution Techniques for Classical CSP . . . . . . . . . . 16 2. 2. 1 Backtrack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2. 2. 2 Backjumping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 2. 2. 3 Conflict-Directed Backjumping . . . . . . . . . . . . . . . . . . . . . 19 2. 2. 4 Backmarking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Internet Applications in Product Design and Manufacturing (Paperback, Softcover reprint of the original 1st ed. 2003): George... Internet Applications in Product Design and Manufacturing (Paperback, Softcover reprint of the original 1st ed. 2003)
George Q. Huang, K.L. Mak
R1,407 Discovery Miles 14 070 Ships in 18 - 22 working days

This book deals with Web applications in product design and manufacture, thus filling an information gap in digital manufacturing in the Internet era. It helps both developers and users to appreciate the potentials, as well as difficulties, in developing and adopting Web applications. The objective is to equip potential users and practitioners of Web applications with a better appreciation of the technology. In addition, Web application developers and new researchers in this field will gain a clearer understanding of the selection of system architecture and design, development and implementation techniques, and deployment strategies. The book is divided into two main parts. The first part gives an overview of Web and Internet and the second explains eight typical Web applications.

Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of... Virtual Corporate Universities - A Matrix of Knowledge and Learning for the New Digital Dawn (Paperback, Softcover reprint of the original 1st ed. 2003)
Walter R.J. Baets, Gert Van Der Linden
R2,639 Discovery Miles 26 390 Ships in 18 - 22 working days

Over the past years, business schools have been experimenting with distance learning and online education. In many cases this new technology has not brought the anticipated results. Questions raised by online education can be linked to the fundamental problem of education and teaching, and more specifically to the models and philosophy of education and teaching. Virtual Corporate Universities: A Matrix of Knowledge and Learning for the New Digital Dawn offers a source for new thoughts about those processes in view of the use of new technologies. Learning is considered as a key-strategic tool for new strategies, innovation, and significantly improving organizational effectiveness. The book blends the elements of knowledge management, as well as organizational and individual learning. The book is not just a treatment of technology, but a fusion of a novel dynamic learner (student)-driven learning concept, the management and creation of dynamic knowledge, and next-generation technologies to generic business, organizational and managerial processes, and the development of human capital. Obviously, the implications of online learning go far beyond the field of business as presented in this book.

iOS 11 Swift Programming Cookbook (Paperback): Vandad Nahavandipoor iOS 11 Swift Programming Cookbook (Paperback)
Vandad Nahavandipoor
R1,484 Discovery Miles 14 840 Ships in 18 - 22 working days

iOS 11, Swift 4, and Xcode 9 provide many new APIs for iOS developers. With this cookbook, you'll learn more than 170 proven solutions for tackling the latest features in iOS 11 and watchOS 4, including new ways to use Swift and Xcode to make your day-to-day app development life easier. This collection of code-rich recipes also gets you up to speed on continuous delivery and continuous integration systems. Ideal for intermediate and advanced iOS developers looking to work with the newest version of iOS, these recipes include reusable code on GitHub, so you can put them to work in your project right away. Among the topics covered by this book: New features in Swift 4 and Xcode 9 Tools for continuous delivery and continuous integration Snapshot testing and test automation Creating document-based applications Updated Map view and Core Location features iOS 11's Security and Password Autofill Data storage with Apple's Core Data Creating lively user interfaces with UI Dynamics Building iMessage applications and sticker packages Integrating Siri into your apps with Siri Kit Creating fascinating apps for Apple Watch

Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises... Processes and Foundations for Virtual Organizations - IFIP TC5 / WG5.5 Fourth Working Conference on Virtual Enterprises (PRO-VE'03) October 29-31, 2003, Lugano, Switzerland (Paperback, Softcover reprint of the original 1st ed. 2004)
Luis M. Camarinha-Matos, Hamideh Afsarmanesh
R2,729 Discovery Miles 27 290 Ships in 18 - 22 working days

Processes and Foundations for Virtual Organizations contains selected articles from PRO-VE'03, the Fourth Working Conference on Virtual Enterprises, which was sponsored by the International Federation for Information Processing (IFIP) and held in Lugano, Switzerland in October 2003. This fourth edition includes a rich set of papers revealing the progress and achievements in the main current focus areas: -VO breeding environments; -Formation of collaborative networked organizations; -Ontologies and knowledge management; -Process models and interoperability; -Infrastructures; -Multi-agent approaches. In spite of many valid contributions in these areas, many research challenges remain. This is clearly stated in a number of papers suggesting a new research agenda and strategic research roadmaps for advanced virtual organizations. With the selected papers included in this book, PRO-VE pursues its double mission as a forum for presentation and discussion of achievements as well as a place to discuss and suggest new directions and research strategies.

Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2010, Toronto,... Agent-Mediated Electronic Commerce. Designing Trading Strategies and Mechanisms for Electronic Markets - AMEC 2010, Toronto, ON, Canada, May 10, 2010, and TADA 2010, Cambridge, MA, USA, June 7, 2010, Revised Selected Papers (Paperback, 2012 ed.)
Esther David, Kate Larson, Alex Rogers, Onn Shehory, Sebastian Stein
R1,294 Discovery Miles 12 940 Ships in 18 - 22 working days

This volume contains 9 thoroughly refereed and revised papers detailing recent advances in research on designing trading agents and mechanisms for agent-mediated e-commerce. They were originally presented at the 12th International Workshop on Agent-Mediated Electronic Commerce (AMEC 2010), collocated with AAMAS 2010 in Toronto, Canada, or the 2010 Workshop on Trading Agent Design and Analysis (TADA 2010), collocated with EC 2010 in Cambridge, MA, USA. The papers examine emerging topics such as ad auctions and supply chains, or the interactions between competing markets, and present novel algorithms and rigorous theoretical results. Several of them evaluate their results using real data from large e-commerce sites or from experiments with human traders.

Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings... Future Security - 7th Security Research Conference, Future Security 2012, Bonn, Germany, September 4-6, 2012. Proceedings (Paperback, 2012 ed.)
Nils Aschenbruck, Peter Martini, Michael Meier, Jens Toelle
R1,477 Discovery Miles 14 770 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th Security Research Conference, Future Security 2012, held in Bonn, Germany, in September 2012. The 78 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on supply chain and critical infrastructure protection; security situational awareness; crisis management; security for critical infrastructure and urban areas; sensor technology; social, psychological and political aspects; cyber defense and information security; maritime and border security; detection of hazardous materials; food chain security; aviation security; ergonomic aspects.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Robotics, Mechatronics, and Artificial…
Newton C. Braga Paperback R1,124 Discovery Miles 11 240
Robotics for Cell Manipulation and…
Changsheng Dai, Guanqiao Shan, … Paperback R2,951 Discovery Miles 29 510
Advanced Computing in Industrial…
Krassimir Georgiev, Michail Todorov, … Hardcover R2,724 Discovery Miles 27 240
Delays and Networked Control Systems
Alexandre Seuret, Laurentiu Hetel, … Hardcover R4,190 R3,389 Discovery Miles 33 890
Interactions Between Computational…
Laszlo T. Koczy, Jesus Medina-Moreno, … Hardcover R2,653 Discovery Miles 26 530
Mixed Reality and Human-Robot…
Xiangyu Wang Hardcover R2,741 Discovery Miles 27 410
Knowledge Representations for Planning…
Franziska Zacharias Hardcover R2,645 Discovery Miles 26 450
Autonomous Guided Vehicles - Methods and…
Hamed Fazlollahtabar, Mohammad Saidi-Mehrabad Hardcover R3,576 R3,316 Discovery Miles 33 160
FastSLAM - A Scalable Method for the…
Michael Montemerlo, Sebastian Thrun Hardcover R2,644 Discovery Miles 26 440
Proceedings of 2018 Chinese Intelligent…
Yingmin Jia, Junping Du, … Hardcover R5,340 Discovery Miles 53 400

 

Partners