Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas.
This book focuses on both theory and applications in the broad areas of computational intelligence and machine learning. The proceedings of the Seventh International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2019) present research papers in the areas of advanced computing, networking, and informatics. It brings together contributions from scientists, professors, scholars, and students and presents essential information on the topic. It also discusses the practical challenges encountered and the solutions used to overcome them, the goal being to promote the "translation" of basic research into applied research and of applied research into practice. The works presented here also demonstrate the importance of basic scientific research in a range of fields.
This two-volume book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. It brings together contributions from scientists, professors, scholars and students, and presents essential information on computing, networking, and informatics. It also discusses the practical challenges encountered and the solutions used to overcome them, the goal being to promote the "translation" of basic research into applied research, and of applied research into practice. The works presented here will also demonstrate the importance of basic scientific research in a range of fields.
This two-volume book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. It brings together contributions from scientists, professors, scholars and students, and presents essential information on computing, networking, and informatics. It also discusses the practical challenges encountered and the solutions used to overcome them, the goal being to promote the "translation" of basic research into applied research, and of applied research into practice. The works presented here will also demonstrate the importance of basic scientific research in a range of fields.
This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the globe. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the globe. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
This three volume book contains the Proceedings of 5th International Conference on Advanced Computing, Networking and Informatics (ICACNI 2017). The book focuses on the recent advancement of the broad areas of advanced computing, networking and informatics. It also includes novel approaches devised by researchers from across the globe. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of International Conference on Advanced Computing and Intelligent Engineering. These volumes bring together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas.
|
You may like...
|