You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including: • The Stuxnet attack on Iran’s uranium refining capability • The hacking of the German Federal Parliament’s internal communication system • The Wannacry malware campai...
Hearings were held in Memphis, Tenn.
This book constitutes the refereed proceedings of the First International Workshop on Self-Organizing Systems, IWSOS 2006. The book offers 16 revised full papers and 6 revised short papers together with 2 invited talks and 3 poster papers. The papers are organized in topical sections on dynamics of structured and unstructured overlays, self-organization in peer-to-peer networks, self-organization in wireless environments, self-organization in distributed and grid computing, self-managing and autonomic computing, and more.
It is 1613 and Heidelberg greets the dawn of a promising, magical age as it welcomes a beautiful English princess. But the promise is false and soon all of central Europe writhes in rebellion and war. Wind Time, Wolf Time follows the lives of two sisters and two brothers as they struggle to survive in treacherous times. Katerina and Anna, poor young women made bold by desperation, tie their destinies to that of their ill-starred princess. Meanwhile, Thomas and Josef, sons of a Munich merchant, discover the secrets of their bitter past as they cross paths with princes and rogues.
None
NSA is a comprehensive collection of international nuclear science and technology literature for the period 1948 through 1976, pre-dating the prestigious INIS database, which began in 1970. NSA existed as a printed product (Volumes 1-33) initially, created by DOE's predecessor, the U.S. Atomic Energy Commission (AEC). NSA includes citations to scientific and technical reports from the AEC, the U.S. Energy Research and Development Administration and its contractors, plus other agencies and international organizations, universities, and industrial and research organizations. References to books, conference proceedings, papers, patents, dissertations, engineering drawings, and journal articles from worldwide sources are also included. Abstracts and full text are provided if available.
Big Data has been much in the news in recent years, and the advantages conferred by the collection and analysis of large datasets in fields such as marketing, medicine and finance have led to claims that almost any real world problem could be solved if sufficient data were available. This is of course a very simplistic view, and the usefulness of collecting, processing and storing large datasets must always be seen in terms of the communication, processing and storage capabilities of the computing platforms available. This book presents papers from the International Research Workshop, Advanced High Performance Computing Systems, held in Cetraro, Italy, in July 2014. The papers selected for p...