0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (2)
  • R250 - R500 (18)
  • R500+ (4,488)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

Cloud Computing and Services Science - Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised... Cloud Computing and Services Science - Third International Conference, CLOSER 2013, Aachen, Germany, May 8-10, 2013, Revised Selected Papers (Paperback, 2014 ed.)
Markus Helfert, Frederic Desprez, Donald Ferguson, Frank Leymann
R1,741 Discovery Miles 17 410 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the Third International Conference on Cloud Computing and Services Science, CLOSER 2013, held in Aachen, Germany, in May 2013. The 8 papers presented were selected from 142 paper submissions. The papers cover the following topics: cloud computing fundamentals; services science foundations for cloud computing; cloud computing platforms and applications; and cloud computing enabling technologies.

Web Information Systems Engineering -- WISE 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014,... Web Information Systems Engineering -- WISE 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part II (Paperback, 2014 ed.)
Boualem Benatallah, Azer Bestavros, Yannis Manolopoulos, Athena Vakali, Yanchun Zhang
R2,904 Discovery Miles 29 040 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge.

Web Information Systems Engineering -- WISE 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014,... Web Information Systems Engineering -- WISE 2014 - 15th International Conference, Thessaloniki, Greece, October 12-14, 2014, Proceedings, Part I (Paperback, 2014 ed.)
Boualem Benatallah, Azer Bestavros, Yannis Manolopoulos, Athena Vakali, Yanchun Zhang
R2,893 Discovery Miles 28 930 Ships in 18 - 22 working days

This book constitutes the proceedings of the 15th International Conference on Web Information Systems Engineering, WISE 2014, held in Thessaloniki, Greece, in October 2014. The 52 full papers, 16 short and 14 poster papers, presented in the two-volume proceedings LNCS 8786 and 8787 were carefully reviewed and selected from 196 submissions. They are organized in topical sections named: Web mining, modeling and classification; Web querying and searching; Web recommendation and personalization; semantic Web; social online networks; software architectures amd platforms; Web technologies and frameworks; Web innovation and applications; and challenge.

Computational Social Networks - Mining and Visualization (Paperback, 2012 ed.): Ajith Abraham Computational Social Networks - Mining and Visualization (Paperback, 2012 ed.)
Ajith Abraham
R2,681 Discovery Miles 26 810 Ships in 18 - 22 working days

This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the other two volumes review Tools, Perspectives, and Applications, and Security and Privacy in CSNs). Topics and features: presents the latest advances in CSNs, and illustrates how organizations can gain a competitive advantage from a better understanding of complex social networks; discusses the design and use of a wide range of computational tools and software for social network analysis; describes simulations of social networks, and the representation and analysis of social networks, highlighting methods for the data mining of CSNs; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology.

Scalable Network Monitoring in High Speed Networks (Paperback, 2011 ed.): Baek-Young Choi, Zhi-Li Zhang, David Hung-Chang Du Scalable Network Monitoring in High Speed Networks (Paperback, 2011 ed.)
Baek-Young Choi, Zhi-Li Zhang, David Hung-Chang Du
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.

Model and Data Engineering - 4th International Conference, MEDI 2014, Larnaca, Cyprus, September 24-26, 2014. Proceedings... Model and Data Engineering - 4th International Conference, MEDI 2014, Larnaca, Cyprus, September 24-26, 2014. Proceedings (Paperback, 2014 ed.)
Yamine Ait Ameur, Ladjel Bellatreche, George A Papadopoulos
R2,301 Discovery Miles 23 010 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 4th International Conference on Model and Data Engineering, MEDI 2014, held in Larnaca, Cyprus, in September 2014. The 16 long papers and 12 short papers presented together with 2 invited talks were carefully reviewed and selected from 64 submissions. The papers specifically focus on model engineering and data engineering with special emphasis on most recent and relevant topics in the areas of modeling and models engineering; data engineering; modeling for data management; and applications and tooling.

Time Division Multiple Access For Vehicular Communications (Paperback, 2014 ed.): Hassan Aboubakr Omar, Weihua Zhuang Time Division Multiple Access For Vehicular Communications (Paperback, 2014 ed.)
Hassan Aboubakr Omar, Weihua Zhuang
R1,571 Discovery Miles 15 710 Ships in 18 - 22 working days

This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. The performance of VeMAC is evaluated via mathematical analysis and computer simulations in comparison with other existing MAC protocols, including the IEEE 802.11p standard. This brief aims at proposing TDMA as a suitable MAC scheme for VANETs, which can support the quality-of-service requirements of high priority VANET applications.

System Analysis and Modeling: Models and Reusability - 8th International Conference, SAM 2014, Valencia, Spain, September... System Analysis and Modeling: Models and Reusability - 8th International Conference, SAM 2014, Valencia, Spain, September 29-30, 2014. Proceedings (Paperback, 2014 ed.)
Daniel Amyot, Pau Fonseca I. Casas, Gunter Mussbacher
R2,248 Discovery Miles 22 480 Ships in 18 - 22 working days

This book constitutes the refereed papers of the proceedings of the 8th International Conference on System Analysis and Modeling, SAM 2014, held in Valencia, Spain, in September 2014. The 18 full papers and the 3 short papers presented together with 2 keynotes were carefully reviewed and selected from 71 submissions. The contributions are organized in topical sections named: reuse; availability, safety and optimization; sequences and interactions; testing; metrics, constraints and repositories; and SDL and V&V.

Web-Age Information Management - WAIM 2014 International Workshops: BigEM, HardBD, DaNoS, HRSUNE, BIDASYS, Macau, China, June... Web-Age Information Management - WAIM 2014 International Workshops: BigEM, HardBD, DaNoS, HRSUNE, BIDASYS, Macau, China, June 16-18, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Yueguo Chen, Wolf-Tilo Balke, Jianliang Xu, Wei Xu, Peiquan Jin, …
R2,555 Discovery Miles 25 550 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of 5 workshops of the 15th International Conference on Web-Age Information Management, WAIM 2014, held in Macau, China, June 16-18, 2014. The 38 revised full papers are organized in topical sections on the 5 following workshops: Second International Workshop on Emergency Management in Big Data Age, BigEM 2014; Second International Workshop on Big Data Management on Emerging Hardware, HardBD 2014; International Workshop on Data Management for Next-Generation Location-based Services, DaNoS 2014; International Workshop on Human Aspects of Making Recommendations in Social Ubiquitous Networking Environment, HRSUME 2014; International Workshop on Big Data Systems and Services, BIDASYS 2014.

Remote Instrumentation and Virtual Laboratories - Service Architecture and Networking (Paperback, 2010 ed.): Franco Davoli,... Remote Instrumentation and Virtual Laboratories - Service Architecture and Networking (Paperback, 2010 ed.)
Franco Davoli, Norbert Meyer, Roberto Pugliese, Sandro Zappatore
R7,702 Discovery Miles 77 020 Ships in 18 - 22 working days

Accessing remote instrumentation worldwide is one of the goals of e-Science. The task of enabling the execution of complex experiments that involve the use of distributed scientific instruments must be supported by a number of different architectural domains, which inter-work in a coordinated fashion to provide the necessary functionality. These domains embrace the physical instruments, the communication network interconnecting the distributed systems, the service oriented abstractions and their middleware. The Grid paradigm (or, more generally, the Service Oriented Architecture -- SOA), viewed as a tool for the integration of distributed resources, plays a significant role, not only to manage computational aspects, but increasingly as an aggregator of measurement instrumentation and pervasive large-scale data acquisition platforms. In this context, the functionality of a SOA allows managing, maintaining and exploiting heterogeneous instrumentation and acquisition devices in a unified way, by providing standardized interfaces and common working environments to their users, but the peculiar aspects of dealing with real instruments of widely different categories may add new functional requirements to this scenario. On the other hand, the growing transport capacity of core and access networks allows data transfer at unprecedented speed, but new challenges arise from wireless access, wireless sensor networks, and the traversal of heterogeneous network domains. The book focuses on all aspects related to the effective exploitation of remote instrumentation and to the building complex virtual laboratories on top of real devices and infrastructures. These include SOA and related middleware, high-speed networking in support of Grid applications, wireless Grids for acquisition devices and sensor networks, Quality of Service (QoS) provisioning for real-time control, measurement instrumentation and methodology, as well as metrology issues in distributed systems.

Decentralized Systems with Design Constraints (Paperback, 2011 ed.): Magdi S. Mahmoud Decentralized Systems with Design Constraints (Paperback, 2011 ed.)
Magdi S. Mahmoud
R4,087 Discovery Miles 40 870 Ships in 18 - 22 working days

Decentralized Control and Filtering provides a rigorous framework for examining the analysis, stability and control of large-scale systems, addressing the difficulties that arise because dimensionality, information structure constraints, parametric uncertainty and time-delays. This monograph serves three purposes: it reviews past methods and results from a contemporary perspective; it examines presents trends and approaches and to provide future possibilities; and it investigates robust, reliable and/or resilient decentralized design methods based on a framework of linear matrix inequalities. As well as providing an overview of large-scale systems theories from the past several decades, the author presents key modern concepts and efficient computational methods. Representative numerical examples, end-of-chapter problems, and typical system applications are included, and theoretical developments and practical applications of large-scale dynamical systems are discussed in depth.

Principles of Computer Systems and Network Management (Paperback, 2009 ed.): Dinesh Chandra Verma Principles of Computer Systems and Network Management (Paperback, 2009 ed.)
Dinesh Chandra Verma
R2,879 Discovery Miles 28 790 Ships in 18 - 22 working days

Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.

Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September... Communications and Multimedia Security - 15th IFIP TC 6/TC 11 International Conference, CMS 2014, Aveiro, Portugal, September 25-26, 2014, Proceedings (Paperback, 2014 ed.)
Bart De Decker, Andre Zuquete
R1,588 Discovery Miles 15 880 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 15th IFIP TC 6/TC 11 International Conference on Communications and Multimedia Security, CMS 2014, held in Aveiro, Portugal, in September 2014. The 4 revised full papers presented together with 6 short papers, 3 extended abstracts describing the posters that were discussed at the conference, and 2 keynote talks were carefully reviewed and selected from 22 submissions. The papers are organized in topical sections on vulnerabilities and threats, identification and authentification, applied security.

Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback,... Ad Hoc Networks - 7th International Conference, AdHocHets 2015, San Remo, Italy, September 1-2, 2015. Proceedings (Paperback, 1st ed. 2015)
Nathalie Mitton, Melike Erol Kantarci, Antoine Gallais, Symeon Papavassiliou
R2,089 Discovery Miles 20 890 Ships in 18 - 22 working days

This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.

Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015): Zhou Lu,... Modeling and Evaluating Denial of Service Attacks for Wireless and Mobile Applications (Paperback, 1st ed. 2015)
Zhou Lu, Wenye Wang, Cliff Wang
R1,709 Discovery Miles 17 090 Ships in 18 - 22 working days

This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.

Digital Signatures (Paperback, 2010 ed.): Jonathan Katz Digital Signatures (Paperback, 2010 ed.)
Jonathan Katz
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

As a beginning graduate student, I recall being frustrated by a general lack of acces sible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren't there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my graduate students now ask me: what is the best resource for learning about (various topics in) cryptography? This monograph is intended to serve as an answer to these 1 questions - at least with regard to digital signature schemes. Given the above motivation, this book has been written with a beginninggraduate student in mind: a student who is potentially interested in doing research in the ?eld of cryptography, and who has taken an introductory course on the subject, but is not sure where to turn next. Though intended primarily for that audience, I hope that advanced graduate students and researchers will ?nd the book useful as well. In addition to covering various constructions of digital signature schemes in a uni?ed framework, this text also serves as a compendium of various "folklore" results that are, perhaps, not as well known as they should be. This book could also serve as a textbook for a graduate seminar on advanced cryptography; in such a class, I expect the entire book could be covered at a leisurely pace in one semester with perhaps some time left over for excursions into related topics.

Production Grids in Asia - Applications, Developments and Global Ties (Paperback, 2010 ed.): Simon C. Lin, Eric Yen Production Grids in Asia - Applications, Developments and Global Ties (Paperback, 2010 ed.)
Simon C. Lin, Eric Yen
R4,011 Discovery Miles 40 110 Ships in 18 - 22 working days

Production Grids in Asia: Applications, Developments and Global Ties, an edited volume, is based on ISGC (International Symposium on Grid Computing), one of the most prestigious annual events in Asia. It brings together scientists and engineers worldwide to exchange ideas, present challenges/solutions, and introduce future development in the field of Grid Computing. ISGC 2008 was held at Academia Sinica, Taipei, Taiwan in April 2008. The edited proceedings present international projects in Grid operation, Grid Middleware and e-Science applications. Leading Grid projects from Asia-Pacific are also covered. Production Grids in Asia: Applications, Developments and Global Ties is designed for a professional audience composed of industry researchers and practitioners within the Grid community. This volume is also suitable for advanced-level students in computer science.

Universal Navigation on Smartphones (Paperback, 2011 ed.): Hassan A. Karimi Universal Navigation on Smartphones (Paperback, 2011 ed.)
Hassan A. Karimi
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Universal navigation is accessible primarily through smart phones providing users with navigation information regardless of the environment (i.e., outdoor or indoor). Universal Navigation on Smartphones provide the most up-to-date navigation technologies and systems for both outdoor and indoor navigation. It also provides a comparison of the similarities and differences between outdoor and indoor navigation systems from both a technological stand point and user's perspective. All aspects of navigation systems including geo-positioning, wireless communication, databases, and functions will be introduced. The main thrust of this book presents new approaches and techniques for future navigation systems including social networking, as an emerging approach for navigation.

Managing and Mining Sensor Data (Paperback, 2013 ed.): Charu C. Aggarwal Managing and Mining Sensor Data (Paperback, 2013 ed.)
Charu C. Aggarwal
R2,773 Discovery Miles 27 730 Ships in 18 - 22 working days

Advances in hardware technology have lead to an ability to collect data with the use of a variety of sensor technologies. In particular sensor notes have become cheaper and more efficient, and have even been integrated into day-to-day devices of use, such as mobile phones. This has lead to a much larger scale of applicability and mining of sensor data sets. The human-centric aspect of sensor data has created tremendous opportunities in integrating social aspects of sensor data collection into the mining process. Managing and Mining Sensor Data is a contributed volume by prominent leaders in this field, targeting advanced-level students in computer science as a secondary text book or reference. Practitioners and researchers working in this field will also find this book useful.

Toward an International Virtual Observatory - Proceedings of the ESO/ESA/NASA/NSF Conference Held at Garching, Germany, 10-14... Toward an International Virtual Observatory - Proceedings of the ESO/ESA/NASA/NSF Conference Held at Garching, Germany, 10-14 June 2002 (Paperback, Softcover reprint of the original 1st ed. 2004)
Peter J. Quinn, Krzysztof M. Gorski
R2,673 Discovery Miles 26 730 Ships in 18 - 22 working days

The book is the first thorough overview of the first important steps to develop a worldwide virtual observatory so that, in the future, it could be easier to "dial-up" a part of the sky than wait many months to access a telescope. The articles in this book present details on the status of the first efforts to develop a standardized framework for the virtual observatory, including steps towards completion and deployment of technical infrastructure, uptake by data providers worldwide, and utilization by the scientific community.

Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014.... Security in Computing and Communications - Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings (Paperback, 2014 ed.)
Jaime Lloret Mauri, Sabu M. Thampi, Danda B. Rawat, Di Jin
R2,576 Discovery Miles 25 760 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.

Human-Centered Software Engineering - 5th IFIP WG 13.2 International Conference, HCSE 2014, Paderborn, Germany, September... Human-Centered Software Engineering - 5th IFIP WG 13.2 International Conference, HCSE 2014, Paderborn, Germany, September 16-18, 2014. Proceedings (Paperback, 2014 ed.)
Stefan Sauer, Cristian Bogdan, Peter Forbrig, Regina Bernhaupt, Marco Winckler
R2,259 Discovery Miles 22 590 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 5th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2014, held in Paderborn, Germany, in September 2014. The 13 full papers and 10 short papers presented together with one keynote were carefully reviewed and selected from 35 submissions. The papers cover various topics such as integration of software engineering and user-centered design; HCI models and model-driven engineering; incorporating guidelines and principles for designing usable products in the development process; usability engineering; methods for user interface design; patterns in HCI and HCSE; software architectures for user interfaces; user interfaces for special environments; representations for design in the development process; working with iterative and agile process models in HCSE; social and organizational aspects in the software development lifecycle; human-centric software development tools; user profiles and mental models; user requirements and design constraints; and user experience and software design.

On the Performance of Web Services (Paperback, 2011 ed.): Zahir Tari, Ann Khoi Anh Phan, Malith Jayasinghe, Vidura Gamini Abhaya On the Performance of Web Services (Paperback, 2011 ed.)
Zahir Tari, Ann Khoi Anh Phan, Malith Jayasinghe, Vidura Gamini Abhaya
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the "kernel" (ithe SOAP engine which delivers messages from one point to another through various networks), and the "server side" (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.

Intelligent Computing, Communication and Devices - Proceedings of ICCD 2014, Volume 1 (Paperback, 2015 ed.): Lakhmi C. Jain,... Intelligent Computing, Communication and Devices - Proceedings of ICCD 2014, Volume 1 (Paperback, 2015 ed.)
Lakhmi C. Jain, Srikanta Patnaik, Nikhil Ichalkaranje
R5,293 Discovery Miles 52 930 Ships in 18 - 22 working days

In the history of mankind, three revolutions which impact the human life are tool-making revolution, agricultural revolution and industrial revolution. They have transformed not only the economy and civilization but the overall development of the human society. Probably, intelligence revolution is the next revolution, which the society will perceive in the next 10 years. ICCD-2014 covers all dimensions of intelligent sciences, i.e. Intelligent Computing, Intelligent Communication and Intelligent Devices. This volume covers contributions from Intelligent Computing, areas such as Intelligent and Distributed Computing, Intelligent Grid & Cloud Computing, Internet of Things, Soft Computing and Engineering Applications, Data Mining and Knowledge discovery, Semantic and Web Technology, and Bio-Informatics. This volume also covers paper from Intelligent Device areas such as Embedded Systems, RFID, VLSI Design & Electronic Devices, Analog and Mixed-Signal IC Design and Testing, Solar Cells and Photonics, Nano Devices and Intelligent Robotics.

Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19,... Research in Attacks, Intrusions and Defenses - 17th International Symposium, RAID 2014, Gothenburg, Sweden, September 17-19, 2014, Proceedings (Paperback, 2014 ed.)
Angelos Stavrou, Herbert Bos, Georgios Portokalidis
R2,693 Discovery Miles 26 930 Ships in 18 - 22 working days

This book constitutes the proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2014, held in Gothenburg, Sweden, in September 2014. The 22 full papers were carefully reviewed and selected from 113 submissions, and are presented together with 10 poster abstracts. The papers address all current topics in computer security, including network security, authentication, malware, intrusion detection, browser security, web application security, wireless security, vulnerability analysis.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Reliability, Availability and…
Erika Cota, Alexandre de Morais Amory, … Hardcover R2,662 Discovery Miles 26 620
Handbook of Computer Networks and Cyber…
Brij B. Gupta, Gregorio Martinez Perez, … Hardcover R7,167 Discovery Miles 71 670
The Internet of Things in the Industrial…
Zaigham Mahmood Hardcover R4,001 Discovery Miles 40 010
Connected Vehicles - Intelligent…
Radovan Miucic Hardcover R4,262 Discovery Miles 42 620
Handbook of Multimedia Information…
Amit Kumar Singh, Anand Mohan Hardcover R6,633 Discovery Miles 66 330
Design and Implementation of Practical…
Akshay Kumar, Ahmed Abdelhadi, … Hardcover R2,663 Discovery Miles 26 630
Distributed Real-Time Systems - Theory…
K. Erciyes Hardcover R2,132 Discovery Miles 21 320
Private Cloud Computing - Consolidation…
Stephen R. Smoot, Nam K. Tan Paperback R1,225 Discovery Miles 12 250
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, … Paperback R2,507 R2,368 Discovery Miles 23 680
Malicious Attack Propagation and Source…
Jiaojiao Jiang, Sheng Wen, … Hardcover R3,336 Discovery Miles 33 360

 

Partners