You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This set comprises of Enterprise Level Security and Enterprise Level Security 2. ELS provides a modern alternative to the fortress approach to security. ELS 2 follows on from the first book, which covered the basic concepts of ELS, to give a discussion of advanced topics and solutions.
This book presents the most interesting talks given at ISSE 2005 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Corporate Governance and why security implies to control the enterprise - Risk Management and how to quantify security threats - Secure Computing and how it will change the way we trust computers - Digital Rights Management and the protection of corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2005.
This book constitutes extended, revised and selected papers from the 21st International Conference on Enterprise Information Systems, ICEIS 2019, held in Heraklion, Crete, Greece, in May 2019. The 26 papers presented in this volume were carefully reviewed and selected for inclusion in this book from a total of 205 submissions. They deal with topics such as data science and databases; ontologies; social networks; knowledge management; software development; human-computer interaction, and multimedia.
Climb every mountain—and ski and snowboard the world’s most amazing slopes, from Aspen to Zermatt. Includes color photos. Based on interviews with leading experts, Fifty Places to Ski and Snowboard Before You Die chronicles the rich history of these sports and the people who’ve mastered them, including Tommy Moe, Jonny Moseley, Billy Kidd, and Greg Harms, and takes you to the fabulous mountains you’ve visited—or have always wanted to visit. Explore the world’s most inspiring skiing and snowboarding destinations: Chugach Mountains (Alaska) * Aspen, Crested Butte, and Steamboat Springs (Colorado) * Tuckerman Ravine (New Hampshire) * Rusutsu (Japan) * Chamonix (France) * Portillo (C...
This volume presents selected peer-reviewed, revised and extended research articles written by prominent researchers who participated in the World Congress on Engineering 2015, held in London, UK, 1-3 July, 2015. This large international conference covered advances in engineering technologies and the physical sciences, with contributions on subjects including mechanical engineering, bioengineering, internet engineering, image engineering, wireless networks, knowledge engineering, manufacturing engineering, and industrial applications. This book offers a snapshot of the state-of-the-art, highlighting tremendous advances in engineering technologies and physical sciences and their applications, and will serve as an excellent reference for researchers and graduate students working in many different disciplines of physical sciences and engineering.
Two large international conferences on Advances in Engineering Sciences were held in London, UK, 29 June - 1 July, 2016, under the World Congress on Engineering (WCE 2016), and San Francisco, USA, 19-21 October, 2016, under the World Congress on Engineering and Computer Science (WCECS 2016) respectively. This volume contains 42 revised and extended research articles written by prominent researchers participating in the conferences. Topics covered include electrical engineering, manufacturing engineering, industrial engineering, computer science, engineering mathematics and industrial applications. The book offers state-of-the-art advances in engineering sciences and also serves as an excellent reference work for researchers and graduate students working with/on engineering sciences.
Machine learning and artificial intelligence are already widely applied to facilitate our daily lives, as well as scientific research, but with the world currently facing a global COVID-19 pandemic, their capacity to provide an important tool to support those searching for a way to combat the novel corona virus has never been more important. This book presents the proceedings of the International Conference on Machine Learning and Intelligent Systems (MLIS 2020), which was due to be held in Seoul, Korea, from 25-28 October 2020, but which was delivered as an online conference on the same dates due to COVID-19 restrictions. MLIS 2020 was the latest in a series of annual conferences that aim t...
This book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how to adequately secure electronic business processes. The topics include: Smart Token and e-ID-Card Developments and their Application - Secure Computing and how it will change the way we trust computers - Risk Management and how to quantify security threats - Awareness raising, Data Protection and how we secure corporate information. Adequate information security is one of the basic requirements of all electronic business processes. It is crucial for effective solutions that the possibilities offered by security technology can be integrated with the commercial requirements of the applications. The reader may expect state-of-the-art: best papers of the Conference ISSE 2006.
Dependable Network Computing provides insights into various problems facing millions of global users resulting from the `internet revolution'. It covers real-time problems involving software, servers, and large-scale storage systems with adaptive fault-tolerant routing and dynamic reconfiguration techniques. Also included is material on routing protocols, QoS, and dead- and live-lock free related issues. All chapters are written by leading specialists in their respective fields. Dependable Network Computing provides useful information for scientists, researchers, and application developers building networks based on commercially off-the-shelf components.
Internet security continues to be one of the most talked about topics in the media today. This guide provides the most current, practical and actually useful security techniques in a comprehensive, easy-to-understand manner. It effectively portrays by example how to configure and maintain a computer and network against the security exposures of the Internet.