Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Developing and Securing the Cloud
  • Language: en
  • Pages: 706

Developing and Securing the Cloud

  • Type: Book
  • -
  • Published: 2013-10-28
  • -
  • Publisher: CRC Press

Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has long been a need for a book that provides detailed guidance on how to develop secure clouds.Filling this void, Developing and Securing the Cloud provides a comprehensive overview of cloud computing t

Data Mining
  • Language: en
  • Pages: 292

Data Mining

  • Type: Book
  • -
  • Published: 2014-01-23
  • -
  • Publisher: CRC Press

Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial products, and future challenges. Three parts divide Data Mining: Part I describes technologies for data mining - database systems, warehousing, machine learning, visualization, decision sup

Database and Applications Security
  • Language: en
  • Pages: 608

Database and Applications Security

  • Type: Book
  • -
  • Published: 2005-05-26
  • -
  • Publisher: CRC Press

This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provides directions for data and application security, including securing emerging applications such as bioinformatics, stream information processing and peer-to-peer computing. Divided into eight sections,

Managing and Mining Multimedia Databases
  • Language: en
  • Pages: 354

Managing and Mining Multimedia Databases

  • Type: Book
  • -
  • Published: 2001-06-28
  • -
  • Publisher: CRC Press

There is now so much data on the Web that managing it with conventional tools is becoming almost impossible. To manage this data, provide interoperability and warehousing between multiple data sources and systems, and extract information from the databases and warehouses, various tools are being developed. In fact, developments in multimedia databa

Knowledge Management
  • Language: en
  • Pages: 458

Knowledge Management

  • Type: Book
  • -
  • Published: 2002
  • -
  • Publisher: MIT Press

An introduction to the field of knowledgemanagement.

Intelligence and Security Informatics
  • Language: en
  • Pages: 197

Intelligence and Security Informatics

This book constitutes the refereed proceedings of the International Workshop on Intelligence and Security Informatics, WISI 2006, held in Singapore in conjunction with the 10th Pacific-Asia Conference on Knowledge Discovery and Data Mining. The 32 papers presented together with the abstract of the keynote talk were carefully reviewed. The papers are organized in sections on Web and text mining for terrorism informatics, cybercrime analysis, network security, and crime data mining.

Securing the Cloud
  • Language: en
  • Pages: 315

Securing the Cloud

  • Type: Book
  • -
  • Published: 2011-04-21
  • -
  • Publisher: Elsevier

Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability, scalability, and in the case of security - resilience. Securing the Cloud explains how to make the move to the cloud, detailing the strengths and weaknesses of securing a company's information with different cloud approaches. It offers a clear and concise framework to secure a business' assets while making the most of this new technology.This book considers alternate approaches for secu...

Artificial Intelligence in Process Engineering
  • Language: en
  • Pages: 383

Artificial Intelligence in Process Engineering

  • Type: Book
  • -
  • Published: 2012-12-02
  • -
  • Publisher: Elsevier

Artificial Intelligence in Process Engineering aims to present a diverse sample of Artificial Intelligence (AI) applications in process engineering. The book contains contributions, selected by the editors based on educational value and diversity of AI methods and process engineering application domains. Topics discussed in the text include the use of qualitative reasoning for modeling and simulation of chemical systems; the use of qualitative models in discrete event simulation to analyze malfunctions in processing systems; and the diagnosis of faults in processes that are controlled by Programmable Logic Controllers. There are also debates on the issue of quantitative versus qualitative information. The control of batch processes, a design of a system that synthesizes bioseparation processes, and process design in the domain of chemical (rather than biochemical) systems are likewise covered in the text. This publication will be of value to industrial engineers and process engineers and researchers.

Handbook of Trustworthy Federated Learning
  • Language: en
  • Pages: 425

Handbook of Trustworthy Federated Learning

None

Advances in Cryptology – ASIACRYPT 2021
  • Language: en
  • Pages: 739

Advances in Cryptology – ASIACRYPT 2021

The four-volume proceedings LNCS 13090, 13091, 13092, and 13093 constitutes the proceedings of the 27th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2021, which was held during December 6-10, 2021. The conference was planned to take place in Singapore, but changed to an online format due to the COVID-19 pandemic. The total of 95 full papers presented in these proceedings was carefully reviewed and selected from 341 submissions. The papers were organized in topical sections as follows: Part I: Best paper awards; public-key cryptanalysis; symmetric key cryptanalysis; quantum security; Part II: physical attacks, leakage and countermeasures; multiparty computation; enhanced public-key encryption and time-lock puzzles; real-world protocols; Part III: NIZK and SNARKs; theory; symmetric-key constructions; homomorphic encryption and encrypted search; Part IV: Lattice cryptanalysis; post-quantum cryptography; advanced encryption and signatures; zero-knowledge proofs, threshold and multi-signatures; authenticated key exchange.