Books in category Computers – System Administration

  • Ubiquitous Intelligence and Computing

    Ubiquitous Intelligence and Computing
    Hai Jin, Laurence T. Yang, Jeffrey J.-P. Tsai

    This book is the refereed proceedings of the Third International Conference on Ubiquitous Intelligence and Computing, UIC 2006, held in Wuhan, China.

  • Mobile Communications

    Mobile Communications
    Jaiyong Lee, Chul-Hee Kang

  • Information Hiding

    Information Hiding
    Jan Camenisch

    This book constitutes the thoroughly refereed post-proceedings of the 8th International Workshop on Information Hiding, IH 2006, held in Alexandria, VA, USA in July 2006.

  • Metadata for Information Management and Retrieval

    Metadata for Information Management and Retrieval
    David Haynes

    This book is essential reading for library and information students at undergraduate and postgraduate level and will also be useful reading for LIS professionals looking for an accessible introduction to metadata.

  • Sicherheit und Vertrauen im Internet

    Sicherheit und Vertrauen im Internet
    Christoph Meinel, Harald Sack

    Dr. Harald Sack ist Senior-Researcher am Hasso-Plattner-Institut für Softwaresystemtechnik GmbH (HPI) an der Universität Potsdam.

  • Intelligent Data Engineering and Automated Learning IDEAL 2000 Data Mining Financial Engineering and Intelligent Agents

    Intelligent Data Engineering and Automated Learning – IDEAL 2000. Data Mining, Financial Engineering, and Intelligent Agents
    Kwong S. Leung, Lai-wan Chan, Helen Meng

    This book constitutes the refereed proceedings of the Second International Conference on Intelligent Data Engineering and Automated Learning, IDEAL 2000, held in Shatin, N.T., Hong Kong, China in December 2000.

  • Cloud Security Automation

    Cloud Security Automation
    Prashant Priyam

    Toward the end of the book, you will gain an understanding of the security compliance requirements for your Cloud. By the end of this book, you will have hands-on experience of automating your cloud security and governance.

  • UM99 User Modeling

    UM99 User Modeling
    Judy Kay

    The biennial series of International Conferences on User Modeling provides a forum in which academic and industrial researchers from all of these fields can exchange their complementary insights on user modeling issues.

  • Principles of Data Mining

    Principles of Data Mining
    Max Bramer

    This book explains and explores the principal techniques of Data Mining, the automatic extraction of implicit and potentially useful information from data, which is increasingly used in commercial, scientific and other application areas.

  • Secure and Trust Computing Data Management and Applications

    Secure and Trust Computing, Data Management, and Applications
    Changhoon Lee, Jean-Marc Seigneur, James J Jong Hyuk Park, Roland R. Wagner

    This book constitutes the refereed proceedings of two workshops held in conjunction with the 8th FIRA International Conference on Secure and Trust Computing, Data Management, and Applications, STA 2011, in Crete, Greece, in June 2011.

1 2 3 4 5 Next >