Free Delivery Over $100
5831 books were found.
Read More >>
This book constitutes the refereed proceedings of the 16th European Symposium on Computer Security, ESORICS 2011,... Read More >>
The economic and political stakes in the current heated debates over “openness” and open standards in the Internet's... Read More >>
This book constitutes the proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection,... Read More >>
The six papers in Part I span the areas of computing collision probability, digital image contour extraction, multiplicatively... Read More >>
Constitutes the refereed proceedings of the 13th IFIP TC13 International Conference on Human-Computer Interaction,... Read More >>
The four-volume set LNCS 6946-6949 constitutes the refereed proceedings of the 13th IFIP TC13 International Conference... Read More >>
This book constitutes the refereed proceedings of the 17th EUNICE 2011 Workshop on energy-aware communications,... Read More >>
Constitutes the joint thoroughly refereed post-proceedings of The Modeling Social Media Workshop, MSM 2010 held... Read More >>
This book constitutes the refereed proceedings of the 8th International Conference on Cooperative Design, Visualization,... Read More >>
Originally published: New York: Farrar, Straus, and Giroux, 2011. Read More >>
The papers address all current issues in smart systems and services, smart objects and environments, cloud and services... Read More >>
This book constitutes the refereed proceedings of the Third International Conference on Electronic Participation,... Read More >>
This book constitutes the refereed proceedings of the Second International Conference on Electronic Government and... Read More >>
This book constitutes the refereed proceedings of the 10th International Conference, EGOV 2011, held in Delft, The... Read More >>
This book constitutes the refereed proceedings of the 8th VLDB Workshop on Secure Data Management held in Seattle,WA,... Read More >>
On an everyday basis, we communicate with one another using various technological mediums, such as text messaging,... Read More >>
If you think you are safe...think again. Read More >>
Social networking attacks are growing at an alarming rate. Companies and end-users have a new attack vector to secure... Read More >>