Related Books
Language: en
Pages: 281
Pages: 281
Type: BOOK - Published: 2008-05-27 - Publisher: Springer Science & Business Media
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber threat is to provide security analysts
Language: en
Pages: 605
Pages: 605
Type: BOOK - Published: 2011-12-07 - Publisher: Springer Science & Business Media
As we entered the 21st century, the rapid growth of information technology has changed our lives more conveniently than we have ever speculated. Recently in all
Language: en
Pages: 299
Pages: 299
Type: BOOK - Published: 2013 - Publisher: Cambridge University Press
Describes principles of the emerging field of data-intensive computing, along with methods for designing, managing and analyzing the big data sets of today.
Language: en
Pages: 635
Pages: 635
Type: BOOK - Published: 2021-12-02 - Publisher: Springer Nature
This two-volume set of LNCS 13017 and 13018 constitutes the refereed proceedings of the 16th International Symposium on Visual Computing, ISVC 2021, which was h
Language: en
Pages: 351
Pages: 351
Type: BOOK - Published: 2016-09-19 - Publisher: Routledge
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security work in the US and around the world.