Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Organized Crime
  • Language: en
  • Pages: 1268
Cross Disciplinary Biometric Systems
  • Language: en
  • Pages: 238

Cross Disciplinary Biometric Systems

Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance. Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their...

Advances in Knowledge Discovery and Data Mining
  • Language: en
  • Pages: 575

Advances in Knowledge Discovery and Data Mining

  • Type: Book
  • -
  • Published: 2019-04-03
  • -
  • Publisher: Springer

The three-volume set LNAI 11439, 11440, and 11441 constitutes the thoroughly refereed proceedings of the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining, PAKDD 2019, held in Macau, China, in April 2019. The 137 full papers presented were carefully reviewed and selected from 542 submissions. The papers present new ideas, original research results, and practical development experiences from all KDD related areas, including data mining, data warehousing, machine learning, artificial intelligence, databases, statistics, knowledge engineering, visualization, decision-making systems, and the emerging applications. They are organized in the following topical sections: classifica...

E-Business and Telecommunications
  • Language: en
  • Pages: 189

E-Business and Telecommunications

This book includes extended and revised versions of a set of selected papers presented at the 19th International Conference on Smart Business Technologies, ICSBT 2022, Lisbon, Portugal, July 14–16, 2022, and 19th International Conference on Security and Cryptography, SECRYPT 2022, Lisbon, Portugal, July 11-13, 2022. The 7 full papers included in the volume were carefully selected from the 143 submissions accepted to participate in the conference. The papers present reciting research on e-Business technology and its current applications; and all aspects of security and privacy.

Computer and Information Security Handbook (2-Volume Set)
  • Language: en
  • Pages: 1968

Computer and Information Security Handbook (2-Volume Set)

  • Type: Book
  • -
  • Published: 2024-08-28
  • -
  • Publisher: Elsevier

Computer and Information Security Handbook, Fourth Edition offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, along with applications and best practices, offering the latest insights into established and emerging technologies and advancements. With new parts devoted to such current topics as Cyber Security for the Smart City and Smart Homes, Cyber Security of Connected and Automated Vehicles, and Future Cyber Security Trends and Directions, the book now has 104 chapters in 2 Volumes written by leading experts in their fields, as well as 8 updated appendices and an expanded glossary.Chapters new to this edition include such timely topics as Threat ...

Mathematical Models Using Artificial Intelligence for Surveillance Systems
  • Language: en
  • Pages: 373

Mathematical Models Using Artificial Intelligence for Surveillance Systems

This book gives comprehensive insights into the application of AI, machine learning, and deep learning in developing efficient and optimal surveillance systems for both indoor and outdoor environments, addressing the evolving security challenges in public and private spaces. Mathematical Models Using Artificial Intelligence for Surveillance Systems aims to collect and publish basic principles, algorithms, protocols, developing trends, and security challenges and their solutions for various indoor and outdoor surveillance applications using artificial intelligence (AI). The book addresses how AI technologies such as machine learning (ML), deep learning (DL), sensors, and other wireless device...

Security, Privacy, and Anonymity in Computation, Communication, and Storage
  • Language: en
  • Pages: 522

Security, Privacy, and Anonymity in Computation, Communication, and Storage

  • Type: Book
  • -
  • Published: 2019-07-10
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Pattern Recognition Applications and Methods
  • Language: en
  • Pages: 215

Pattern Recognition Applications and Methods

  • Type: Book
  • -
  • Published: 2019-01-04
  • -
  • Publisher: Springer

This book contains revised and extended versions of selected papers from the 7th International Conference on Pattern Recognition, ICPRAM 2018, held in Porto, Portugal, in January 2018. The 10 full papers presented were carefully reviewed and selected from 102 initial submissions. The core of ICPRAM is intended to include theoretical studies yielding new insights in Pattern Recognition methods, as well as experimental validation and concrete application of Pattern Recognition techniques to real-world problems.

E-Business and Telecommunications
  • Language: en
  • Pages: 390

E-Business and Telecommunications

  • Type: Book
  • -
  • Published: 2019-01-17
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 14th International Joint Conference on E-Business and Telecommunications, ICETE 2017, held in Madrid, Spain, in July 2017. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS. The 17 full papers presented were carefully reviewed and selected from 195 submissions. The papers cover the following key areas of information and communication technologies, including data communication and networking, e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.

Computer and Information Security Handbook
  • Language: en
  • Pages: 1200

Computer and Information Security Handbook

  • Type: Book
  • -
  • Published: 2012-11-05
  • -
  • Publisher: Newnes

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber wa...