This engaging and accessible book presents a set of representative concepts connected by the theme of information security, demonstrating how each allows us to solve real problems. The discussions are
Students studying computer animation and computer games have to be familiar with geometry, matrices, vectors, rotation transforms, quaternions, curves and surfaces, and as computer graphics software b
This Springer Brief discusses efficient security protocols and schemes for multi-hop wireless networks. It presents an overview of security requirements for these networks, explores challenges in secu
This book covers performance analysis of computer networks, and begins by providing the necessary background in probability theory, random variables, and stochastic processes. Queuing theory and sim
This book contains the joint proceedings of the Winter School of Hakodate (WSH) 2011 held in Hakodate, Japan, March 15–16, 2011, and the 6th International Workshop on Natural Computing (6th IWNC) held
Have you harbored questions about what Homeland Security is and how it affects you at the hometown level? This book is directed at the general audience, not necessarily the homeland security professio
Security and Privacy in Social Networks brings to the forefront innovative approaches for analyzing and enhancing the security and privacy dimensions in online social networks, and is the first compre
Businesses, institutions, families, and individuals rely on security measures to keep themselves and their assets safe. In "The Art and Science of Security, " author Joel Jesus M. Supan provides a pra
This book constitutes the refereed proceedings of the 4th International Conference on Computer Vision/Computer Graphics Collaboration Techniques, MIRAGE 2009, held in Rocquencourt, France, in May 2009
Taking readers to the cutting edge of physics, mathematics, and computer science, Julian Brown tells the dramatic story of the groundbreaking efforts to create a fundamentally new kind of computer tha
This book constitutes the thoroughly refereed post-conference proceedings of the 9th International ICST Conference on Security and Privacy in Communication Networks, held in Sydney, Australia, in Sept
This book constitutes the thoroughly refereed post-conference proceedings of the International IFIP WG 5.7 Conference on Advances in Production Management Systems, APMS 2011, held in Stavanger, Norway
This book analyzes the latest advances in privacy, security and risk technologies within cloud environments. With contributions from leading experts, the text presents both a solid overview of the fie
Predictions for 2011-2019 In this book you will read exactly what the ancient prophecies are predicting for the dates March 12, 2016, March 12, 2017 and March 12, 2018, plus or minus 30 days. Or in J
This Festschrift volume contains the proceedings of the conference Mathematical Methods in Computer Science, MMICS 2008, which was held during December 17-19, 2008, in Karlsruhe, Germany, in memory of
This book constitutes the refereed proceedings of the IEEE International Conference on Intelligence and Security Informatics, ISI 2005, held in Atlanta, GA, USA in May 2005.The 28 revised full papers,
Does your soul play a part in the choices you make? Astrologer, David R. Railey thinks so. Everyone says they want fulfillment and security, but this book provides clues and insights often obscured by
THE FIRST FINANCIAL GUIDE TAILORED EXCLUSIVELY TO LESBIAN AND GAY COUPLES ON HOW TO PROTECT THEIR ASSETS WHEN LAWS FAILLesbian and gay couples can achieve solid, long-term financial security--but they
This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Symposium on Computer Music Modeling and Retrieval, CMMR 2013, held in Marseille, France, in October
Content-based 3-D object retrieval has attracted extensive attention recently and has applications in a variety of fields, such as, computer-aided design, tele-medicine,mobile multimedia, virtual real
In many computer vision applications, objects have to be learned and recognized in images or image sequences. This book presents new probabilistic hierarchical models that allow an efficient represent
This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Critical Information Infrastructures Security, CRITIS 2013, held in Amsterdam, The Netherlands, in S
In this primer for IT specialists on the aspects of molecular biology and medicine that lend themselves to the application of computer science, budding bioinformaticians will find clear explanations o
In this book, internationally recognized experts in philosophy of science, computer science, and modeling and simulation are contributing to the discussion on how ontology, epistemology, and teleology
Requirements Engineering and Management for Software Development Projects presents a complete guide on requirements for software development including engineering, computer science and management acti
The 1980s and 1990s experienced a proliferation of schools implementing Computer-Based Learning (CBL) and/or Computer-Based Training (CBT) because of today's technological growth. As Technology Educat
Malicious software (i.e., malware) has become a severe threat to interconnected computer systems for decades and has caused billions of dollars damages each year. A large volume of new malware samples
This historical mystery contains two stories which gradually merge into one. One occurs during 2011, while the other takes place in 1863 during the height of the Civil War.In 2011, after moving to Sou
Science FictionAfter fulfilling every objective of a top secret mission to Jupiter's Ganymede and now only days from home, four NASA astronauts learn from their computer systems analyst in Houston thr
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
By the year 2050, great advances have been made in the realm of computer science, but the most sophisticated computer ever to have been built is about to be revealed to the world. The brainchild of Pr
Linda, la Princesa de la Jungla (2011) Linda, la Princesa de la Jungla (2011) es su primera obra narrativa donde relata la vida de una mujer que ha vivido momentos felices, historias tristes y violent
Linda, la Princesa de la Jungla (2011) Linda, la Princesa de la Jungla (2011) es su primera obra narrativa donde relata la vida de una mujer que ha vivido momentos felices, historias tristes y violent
Despu s de los xitos alcanzados con "Anjonio" en el 2010, "Una mujer llamada Perla" en el 2011, y de ser premiada por el Instituto de Cultura Peruana en el g nero de Poes a tambi n en el 2011, Ana Fer
Despu s de los xitos alcanzados con "Anjonio" en el 2010, "Una mujer llamada Perla" en el 2011, y de ser premiada por el Instituto de Cultura Peruana en el g nero de Poes a tambi n en el 2011, Ana Fer
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Survival. It's the primary instinct built into every living thing. Computer programmer Ian Daniels has designed his latest masterpiece, the Survivor Program. Able to boost the creativity and cunning,
Engineers and scientists need to have an introduction to the basics of linear algebra in a context they understand. Computer algebra systems make the manipulation of matrices and the determination of
This collection covers advances in automatic differentiation theory and practice. Computer scientists and mathematicians will learn about recent developments in automatic differentiation theory as wel