0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (23)
  • R250 - R500 (182)
  • R500+ (2,686)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Impact of computing & IT on society

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2015, Ho Chi Minh City, Vietnam, May 19, 2015. Proceedings (Paperback, 2015 ed.)
Michael Chau, G. Alan Wang, Hsinchun Chen
R1,276 Discovery Miles 12 760 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2015, held in Ho Chi Minh City, Vietnam, in May 2015 in conjunction with PAKDD 2015, the 19th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 8 revised full papers presented were carefully reviewed and selected from numerous submissions. Topics of the workshop are information sharing and big data analytics, infrastructure protection and emergency responses, cybercrime and terrorism informatics and analytics, as well as enterprise risk management, IS security and social media analytics. The papers present a significant view on regional data sets and case studies, including online social media and multimedia, fraud deception and text mining.

Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings (Paperback, 2014 ed.):... Secure Data Management - 10th VLDB Workshop, SDM 2013, Trento, Italy, August 30, 2013, Proceedings (Paperback, 2014 ed.)
Willem Jonker, Milan Petkovic
R1,906 Discovery Miles 19 060 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 10th VLDB Workshop on Secure Data Management held in Trento, Italy, on August 30, 2013. The 15 revised full papers and one keynote paper presented were carefully reviewed and selected from various submissions. The papers are organized in technical papers and 10 vision papers which address key challenges in secure data management and indicate interesting research questions.

Information and Communication Technology - Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia,... Information and Communication Technology - Second IFIP TC 5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014, Proceedings (Paperback, 2014 ed.)
Linawati, Made Sudiana Mahendra, Erich J Neuhold, A. Min Tjoa, Ilsun You
R2,999 Discovery Miles 29 990 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second IFIP TC 5/8 International Conference on Information and Communication Technology, ICT-Eur Asia 2014, with the collocation of Asia ARES 2014 as a special track on Availability, Reliability and Security, held in Bali, Indonesia, in April 2014. The 70 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers have been organized in the following topical sections: applied modeling and simulation; mobile computing; advanced urban-scale ICT applications; semantic web and knowledge management; cloud computing; image processing; software engineering; collaboration technologies and systems; e-learning; data warehousing and data mining; e-government and e-health; biometric and bioinformatics systems; network security; dependable systems and applications; privacy and trust management; cryptography; multimedia security and dependable systems and applications.

Digital Technologies for School Collaboration (Paperback, 1st ed. 2014): A. Gouseti Digital Technologies for School Collaboration (Paperback, 1st ed. 2014)
A. Gouseti
R1,748 R1,528 Discovery Miles 15 280 Save R220 (13%) Ships in 10 - 15 working days

Web-based school collaboration has attracted the sustained attention of educators, policy-makers, and governmental bodies around the world during the past decade. This book sheds new light on this topical but ever so complex issue. Drawing on a wealth of theoretical and empirical work, it presents the various models of available school twinning programs and explores the cultural, political, and economic factors that surround the recent enthusiasm regarding collaborative initiatives. Moreover, the book critically examines teachers' and students' experiences of web-based school collaboration. In particular, it develops a realistic perspective of the range of challenges they face and identifies the host of technological and non-technological issues that can shape participation in collaborative programs.

Informatikkultur Neu Denken - Konzepte Fur Studium Und Lehre - Integration Von Gender Und Diversity in Mint-Studiengangen... Informatikkultur Neu Denken - Konzepte Fur Studium Und Lehre - Integration Von Gender Und Diversity in Mint-Studiengangen (English, German, Paperback, 2014 ed.)
Carmen Leicht-Scholten, Ulrik Schroeder
R1,239 Discovery Miles 12 390 Ships in 10 - 15 working days

Mit dem Projekt IGaDtools4MINT wurde angestrebt, die Interdisziplinaritat, die Anwendungsbezogenheit und die grosse Bedeutung der Informatik fur Entwicklungen, von denen Menschen auf der ganzen Welt profitieren konnen, starker in die Curricula zu integrieren, um die Wichtigkeit der Teilhabe an diesen Entwicklungen zu demonstrieren sowie die Attraktivitat des Studienfachs fur verschiedenste Studierende weiter zu steigern. Zudem soll durch gezielte Massnahmenentwicklung der Anteil von Frauen und anderen bislang unterreprasentierten Gruppen in der Informatik erhoht und die Studienabbruchquoten nachhaltig gesenkt werden. Langfristig soll dadurch eine Offnung der Fachkultur Informatik erreicht werden."

Multimedia Communications, Services and Security - 7th International Conference, MCSS 2014, Krakow, Poland, June 11-12, 2014.... Multimedia Communications, Services and Security - 7th International Conference, MCSS 2014, Krakow, Poland, June 11-12, 2014. Proceedings (Paperback, 2014 ed.)
Andrzej Dziech, Andrzej Czyzewski
R2,273 Discovery Miles 22 730 Ships in 10 - 15 working days

This volume constitutes the refereed proceedings of the 7th International Conference on Multimedia Communications, Services and Security, MCSS 2014, held in Krakow, Poland, in June 2014. The 21 full papers included in the volume were selected from numerous submissions. The papers cover ongoing research activities in the following topics: audiovisual systems, novel multimedia architectures, multimedia data fusion, acquisition of multimedia content, quality of experience management, watermarking technology and applications, content searching methods, interactive multimedia applications, cybercrime countermeasures, cryptography, biometry, as well as privacy protection solutions.

Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings... Intelligence and Security Informatics - Pacific Asia Workshop, PAISI 2014, Tainan, Taiwan, May 13, 2014, Proceedings (Paperback, 2014 ed.)
Michael Chau, Hsinchun Chen, G. Alan Wang, Jau-Hwang Wang
R1,779 Discovery Miles 17 790 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2014, held in Tainan, Taiwan, in May 2014 in conjunction with PAKDD 2014, the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 7 revised full papers presented together with one short paper were carefully reviewed and selected from 10 submissions. The papers are organized in topical sections on regional data sets and case studies, cybercrime, information security engineering and text mining.

Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings... Privacy Technologies and Policy - Second Annual Privacy Forum, APF 2014, Athens, Greece, May 20-21, 2014, Proceedings (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R2,055 Discovery Miles 20 550 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the Second Annual Privacy Forum, APF 2014, held in Athens, Greece, in May 2014. The 12 revised papers presented in this volume were carefully reviewed and selected from 21 submissions. The topics include: the concept and implementation of "privacy by design," with applications to encrypted databases; the study of video surveillance architectures and new networking concepts and innovative solutions for identity management. The papers address the technical, legal, and economic aspects of these problems.

Mobile Computing, Applications, and Services - 5th International Conference, MobiCase 2013, Paris, France, November 7-8, 2013,... Mobile Computing, Applications, and Services - 5th International Conference, MobiCase 2013, Paris, France, November 7-8, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Gerard Memmi, Ulf Blanke
R2,480 Discovery Miles 24 800 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Mobile Computing, Applications, and Services (MobiCASE 2013) held in Paris, France, in November 2013. The 13 full, 5 short and 9 poster papers were carefully reviewed and selected from 64 submissions, and are presented together with 3 papers from the Workshop on Near Field Communication for Mobile Applications (NFS). The conference papers are covering mobile applications development, mobile social networking, novel user experience and interfaces, mobile services and platforms such as Android, iOS, BlackBerry OS, Windows phone, Bada, mobile software engineering and mobile Web, mobile payments and M2M infrastructure, mobile services such as novel hardware add-ons, energy aware services or tools, NFC-based services, authentication services.

Multimodal Pattern Recognition of Social Signals in Human-Computer-Interaction - Third IAPR TC3 Workshop, MPRSS 2014,... Multimodal Pattern Recognition of Social Signals in Human-Computer-Interaction - Third IAPR TC3 Workshop, MPRSS 2014, Stockholm, Sweden, August 24, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Friedhelm Schwenker, Stefan Scherer, Louis-Philippe Morency
R1,671 Discovery Miles 16 710 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-workshop proceedings of the Third IAPR TC3 Workshop on Pattern Recognition of Social Signals in Human-Computer-Interaction, MPRSS 2014, held in Stockholm, Sweden, in August 2014, as a satellite event of the International Conference on Pattern Recognition, ICPR 2014. The 14 revised papers presented focus on pattern recognition, machine learning and information fusion methods with applications in social signal processing, including multimodal emotion recognition, user identification, and recognition of human activities.

E-Democracy, Security, Privacy and Trust in a Digital World - 5th International Conference, E-Democracy 2013, Athens, Greece,... E-Democracy, Security, Privacy and Trust in a Digital World - 5th International Conference, E-Democracy 2013, Athens, Greece, December 5-6, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Alexander B. Sideridis, Zoe Kardasiadou, Constantine P. Yialouris, Vasilios Zorkadis
R2,158 Discovery Miles 21 580 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Security, Privacy and Trust in a Digital World, e-Democracy 2013, held in Athens, Greece, December 2013. The 20 revised full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections on security, privacy; e-governance; e-government applications, virtualizations; politics, legislation: European initiatives.

AI Approaches to the Complexity of Legal Systems - AICOL 2013 International Workshops, AICOL-IV@IVR, Belo Horizonte, Brazil,... AI Approaches to the Complexity of Legal Systems - AICOL 2013 International Workshops, AICOL-IV@IVR, Belo Horizonte, Brazil, July 21-27, 2013 and AICOL-V@SINTELNET-JURIX, Bologna, Italy, December 11, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Pompeu Casanovas, Ugo Pagallo, Monica Palmirani, Giovanni Sartor
R2,342 Discovery Miles 23 420 Ships in 10 - 15 working days

This book constitutes revised selected papers from the two International Workshops on Artificial Intelligence Approaches to the Complexity of Legal Systems, AICOL IV and AICOL V, held in 2013. The first took place as part of the 26th IVR Congress in Belo Horizonte, Brazil, during July 21-27, 2013; the second was held in Bologna as a joint special workshop of JURIX 2013 on December 11, 2013. The 19 papers presented in this volume were carefully reviewed and selected for inclusion in this book. They are organized in topical sections named: social intelligence and legal conceptual models; legal theory, normative systems and software agents; semantic Web technologies, legal ontologies and argumentation; and crowdsourcing and online dispute resolution (ODR).

Screen-obsessed: Parenting In The Digital Age (Hardcover): Wonsun Shin, May O. Lwin Screen-obsessed: Parenting In The Digital Age (Hardcover)
Wonsun Shin, May O. Lwin
R1,347 Discovery Miles 13 470 Ships in 10 - 15 working days

Screen-obsessed: Parenting in the Digital Age is the first book solely focusing on parental supervision of children's media use. This book distills important information regarding how parents can effectively guide their offspring living in the multimedia environment. This book discusses an extensive range of theories, issues, and subjects of parental mediation. Readers will discover how parental mediation works, new and traditional theoretical facets, and how this knowledge can be applied in various settings pertinent to the family.

Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings... Information Theoretic Security - 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (Paperback, 2014 ed.)
Carles Padro
R2,250 Discovery Miles 22 500 Ships in 10 - 15 working days

This book constitutes the proceedings of the 7th International Conference on Information Theoretic Security, ICITS 2013, held in Singapore in November 2013. The 14 papers presented in this volume were carefully reviewed and selected from 49 submissions. Topics of interest are: unconditional security, quantum cryptography, authentication codes, wiretap channels, randomness extraction, codes and cryptography, lattices and cryptography, secret sharing, multiparty Computation, bounded storage model, oblivious transfer, nonlocality and nonsignaling, quantum information theory, network coding security, physical models and assumptions, physical layer security.

Trust Management for Service-Oriented Environments (Paperback, 2009 ed.): Zaki Malik, Athman Bouguettaya Trust Management for Service-Oriented Environments (Paperback, 2009 ed.)
Zaki Malik, Athman Bouguettaya
R2,873 Discovery Miles 28 730 Ships in 10 - 15 working days

Web services and service oriented environments are key enablers for the migration of entertainment, business, sociability, science and health-care from the physical world to the virtual world. The result of this on-going migration is a new place very much different from the physical world, one where interconnected services interact with human users, sensors and embedded devices. Yet for this vision to become reality, trust needs to be addressed as members of the global e-society r- ularly today deal with the question whether they can trust other, unknown parties. Trust is a vital component of internet-based interactions and service-oriented en- ronment, but all too often it is assumed to be an implicit property that exists in the background rather than being an explicit property that is well-de ned and quant- able. While providing trust is challenging in existing computing systems, providing trust in service oriented environments is much more complex due to the dynamic and adaptable nature of these environment which are often large scale and across domains. To date the problem of trust for service oriented environments has been largely unexplored. This book represents the rst comprehensivecoverageof the principles,methods and systems for trust management and evaluation in service oriented environments.

Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15,... Constructive Side-Channel Analysis and Secure Design - 5th International Workshop, COSADE 2014, Paris, France, April 13-15, 2014. Revised Selected Papers (Paperback, 2014 ed.)
Emmanuel Prouff
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 5th International Workshop, COSADE 2014, held in Paris, France, in April 2014. The 20 revised full papers presented together with two invited talks were carefully selected from 51 submissions and collect truly existing results in cryptographic engineering, from concepts to artifacts, from software to hardware, from attack to countermeasure.

Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013,... Public Key Infrastructures, Services and Applications - 10th European Workshop, EuroPKI 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Sokratis Katsikas, Isaac Agudo
R1,967 Discovery Miles 19 670 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th European Workshop, EuroPKI 2013, held in Egham, UK, in September 2013. The 11 revised full papers presented together with 1 invited talk were carefully selected from 20 submissions. The papers are organized in topical sections such as authorization and delegation, certificates management, cross certification, interoperability, key management, legal issues, long-time archiving, time stamping, trust management, trusted computing, ubiquitous scenarios and Web services security.

Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected... Privacy Technologies and Policy - First Annual Privacy Forum, APF 2012, Limassol, Cyprus, October 10-11, 2012, Revised Selected Papers (Paperback, 2014 ed.)
Bart Preneel, Demosthenes Ikonomou
R2,001 Discovery Miles 20 010 Ships in 10 - 15 working days

This book constitutes revised selected papers from the First Annual Privacy Forum, APF 2012, held in Limassol, Cyprus, in October 2012. The 13 revised papers presented in this volume were carefully reviewed and selected from 26 submissions. They are organized in topical sections named: modelling; privacy by design; identity management and case studies.

Building the e-World Ecosystem - 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas,... Building the e-World Ecosystem - 11th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2011, Kaunas, Lithuania, October 12-14, 2011, Revised Selected Papers (Paperback, 2011)
Tomas Skersys, Rimantas Butleris, Lina Nemuraite, Reima Suomi
R1,532 Discovery Miles 15 320 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 11th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2011, held in Kaunas, Lithuania, in October 2011. The 25 revised papers presented were carefully reviewed and selected from numerous submissions. They are organized in the following topical sections: e-government and e-governance, e-services, digital goods and products, e-business process modeling and re-engineering, innovative e-business models and implementation, e-health and e-education, and innovative e-business models.

Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014,... Cyber Security and Privacy - Third Cyber Security and Privacy EU Forum, CSP Forum 2014, Athens, Greece, May 21-22, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Frances Cleary, Massimo Felici
R1,998 Discovery Miles 19 980 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed, selected papers on the Second Cyber Security and Privacy EU Forum, CSP 2014, held in Athens, Greece, in May 2014. The 14 revised full papers presented were carefully reviewed and selected from 90 submissions. The papers are organized in topical sections on security; accountability, data protection and privacy; research and innovation.

Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September... Critical Information Infrastructures Security - 8th International Workshop, CRITIS 2013, Amsterdam, The Netherlands, September 16-18, 2013, Revised Selected Papers (Paperback, 2013 ed.)
Eric Luiijf, Pieter Hartel
R2,147 Discovery Miles 21 470 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in September 2013. The 16 revised full papers and 4 short papers were thoroughly reviewed and selected from 57 submissions. The papers are structured in the following topical sections: new challenges, natural disasters, smart grids, threats and risk, and SCADA/ICS and sensors.

Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers... Security and Privacy in Communication Networks - 9th International ICST Conference, SecureComm 2013, Revised Selected Papers (Paperback, 2013 ed.)
Tanveer Zia, Albert Zomaya, Vijay Varadharajan, Morley Mao
R2,710 Discovery Miles 27 100 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in September 2013. The 26 revised full papers presented were carefully reviewed and selected from 70 submissions. The papers are grouped in topical sections on: security and privacy in mobile, sensor and ad hoc networks; malware, botnets and distributed denial of service; security for emerging technologies: VoIP, peer-to-peer and cloud computing; encryption and key management; security in software and machine learning; network and system security model; security and privacy in pervasive and ubiquitous computing.

Human ICT Implants: Technical, Legal and Ethical Considerations (Paperback, 2012 ed.): Mark N. Gasson, Eleni Kosta, Diana M.... Human ICT Implants: Technical, Legal and Ethical Considerations (Paperback, 2012 ed.)
Mark N. Gasson, Eleni Kosta, Diana M. Bowman
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Human information and communication technology (ICT) implants have developed for many years in a medical context. Such applications have become increasingly advanced, in some cases modifying fundamental brain function. Today, comparatively low-tech implants are being increasingly employed in non-therapeutic contexts, with applications ranging from the use of ICT implants for VIP entry into nightclubs, automated payments for goods, access to secure facilities and for those with a high risk of being kidnapped. Commercialisation and growing potential of human ICT implants have generated debate over the ethical, legal and social aspects of the technology, its products and application. Despite stakeholders calling for greater policy and legal certainty within this area, gaps have already begun to emerge between the commercial reality of human ICT implants and the current legal frameworks designed to regulate these products. This book focuses on the latest technological developments and on the legal, social and ethical implications of the use and further application of these technologies.

The Taxobook - Principles and Practices of Building Taxonomies, Part 2 of a 3-Part Series (Paperback): Marjorie Hlava The Taxobook - Principles and Practices of Building Taxonomies, Part 2 of a 3-Part Series (Paperback)
Marjorie Hlava
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

This book outlines the basic principles of creation and maintenance of taxonomies and thesauri. It also provides step by step instructions for building a taxonomy or thesaurus and discusses the various ways to get started on a taxonomy construction project. Often, the first step is to get management and budgetary approval, so I start this book with a discussion of reasons to embark on the taxonomy journey. From there I move on to a discussion of metadata and how taxonomies and metadata are related, and then consider how, where, and why taxonomies are used. Information architecture has its cornerstone in taxonomies and metadata. While a good discussion of information architecture is beyond the scope of this work, I do provide a brief discussion of the interrelationships among taxonomies, metadata, and information architecture. Moving on to the central focus of this book, I introduce the basics of taxonomies, including a definition of vocabulary control and why it is so important, how indexing and tagging relate to taxonomies, a few of the types of tagging, and a definition and discussion of post- and pre-coordinate indexing. After that I present the concept of a hierarchical structure for vocabularies and discuss the differences among various kinds of controlled vocabularies, such as taxonomies, thesauri, authority files, and ontologies. Once you have a green light for your project, what is the next step? Here I present a few options for the first phase of taxonomy construction and then a more detailed discussion of metadata and markup languages. I believe that it is important to understand the markup languages (SGML and XML specifically, and HTML to a lesser extent) in relation to information structure, and how taxonomies and metadata feed into that structure. After that, I present the steps required to build a taxonomy, from defining the focus, collecting and organizing terms, analyzing your vocabulary for even coverage over subject areas, filling in gaps, creating relationships between terms, and applying those terms to your content. Here I offer a cautionary note: don't believe that your taxonomy is "done!" Regular, scheduled maintenance is an important-critical, really-component of taxonomy construction projects. After you've worked through the steps in this book, you will be ready to move on to integrating your taxonomy into the workflow of your organization. This is covered in Book 3 of this series. Table of Contents: List of Figures / Preface / Acknowledgments / Building a Case for Building a Taxonomy / Taxonomy Basics / Getting Started / Terms: The Building Blocks of a Taxonomy / Building the Structure of Your Taxonomy / Evaluation and Maintenance / Standards and Taxonomies / Glossary / End Notes / Author Biography

Patent Law for Computer Scientists - Steps to Protect Computer-Implemented Inventions (Paperback, 2010 ed.): Daniel Closa, Alex... Patent Law for Computer Scientists - Steps to Protect Computer-Implemented Inventions (Paperback, 2010 ed.)
Daniel Closa, Alex Gardiner, Falk Giemsa, Joerg Machek
R1,497 Discovery Miles 14 970 Ships in 10 - 15 working days

Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent. This is particularly true for inventions implemented on a computer. While roughly a third of all applications (and granted patents) relate, in one way or another, to a computer, applications where the innovation mainly resides in software or in a business method are treated differently by the major patent offices in the US (USPTO), Japan (JPO), and Europe (EPO). The authors start with a thorough introduction into patent laws and practices, as well as in related intellectual property rights, which also explains the procedures at the USPTO, JPO and EPO and, in particular, the peculiarities in the treatment of applications centering on software or computers. Based on this theoretical description, next they present in a very structured way a huge set of case studies from different areas like business methods, databases, graphical user interfaces, digital rights management, and many more. Each set starts with a rather short description and claim of the "invention", then explains the arguments a legal examiner will probably have, and eventually refines the description step by step, until all the reservations are resolved. All of these case studies are based on real-world examples, and will thus give an inexperienced developer an idea about the required level of detail and description he will have to provide. Together, Closa, Gardiner, Giemsa and Machek have more than 70 years experience in the patent business. With their academic background in physics, electronic engineering, and computer science, they know about both the legal and the subject-based subtleties of computer-based inventions. With this book, they provide a guide to a patent examiner's way of thinking in a clear and systematic manner, helping to prepare the first steps towards a successful patent application.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Evaluating Children's Interactive…
Panos Markopoulos, Janet C. Read, … Paperback R1,248 Discovery Miles 12 480
Modeling and Analysis of Real-Time and…
Bran Selic, Sebastien Gerard Paperback R1,275 Discovery Miles 12 750
Self-Sustaining Systems - First…
Robert Hirschfeld, Kim Rose Paperback R1,521 Discovery Miles 15 210
Innovation Together - Microsoft Research…
Lolan Song Hardcover R2,888 Discovery Miles 28 880
Advances in Electromechanical…
V.C. Pandey, P. M. Pandey, … Hardcover R8,531 Discovery Miles 85 310
Sakamoto Days, Vol. 4
Yuto Suzuki Paperback R270 R241 Discovery Miles 2 410
Biometric Technologies and Verification…
John Vacca Paperback R1,682 Discovery Miles 16 820
Designing Inclusive Interactions…
P. Langdon, P. John Clarkson, … Hardcover R5,597 Discovery Miles 55 970
Captain America
Jack Kirby, Joe Simon, … Paperback R622 Discovery Miles 6 220
Web Dynpro ABAP for Practitioners
Ulrich Gellert, Ana Daniela Cristea Hardcover R1,610 Discovery Miles 16 100

 

Partners