|
Encyclopedia of healthcare information systems
|
Nilmini Wickramasinghe,Eliezer Geisler |
"This book provides an extensive and rich compilation of international research, discussing the use, adoption, design, and diffusion of information communication technologies (ICTs) in healthcare, in… |
OL16933564W |
|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Information retrieval
|
William R. Hersh |
This work covers the theory, implementation and evaluation of information retrieval (IR) systems in health and biomedicine. The three sections cover the basic concepts of IR, the current state-of-the… |
OL18757577W |
|
Ad-hoc, Mobile, and Wireless Network
|
Jacek Cichoń |
This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Ad-hoc, Mobile, and Wireless Networks, ADHOC-NOW 2013, held in Wroclaw, Poland, in July 2013. The 27 … |
OL19823798W |
|
Advances in Cryptology – ASIACRYPT 2012
|
Xiaoyun Wang |
<p>This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in… |
OL19824322W |
|
Computer-Supported Collaboration
|
Fadi P. Deek |
Computer-Supported Collaboration with Applications to Software Development reviews the theory of collaborative groups and the factors that affect collaboration, particularly collaborative software de… |
OL19836762W |
|
Critical Infrastructure Protection VI
|
Jonathan Butts |
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to day-to-day operations in every sector: information and telecommunications, banking… |
OL19838658W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
Digital Forensics and Cyber Crime
|
Pavel Gladyshev |
This book contains a selection of thoroughly refereed and revised papers from the Third International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2011, held October 26-28 in Dublin, … |
OL19843249W |
|
Formal Aspects of Component Software
|
Farhad Arbab |
<p>This book constitutes revised selected papers of the 8th International Workshop on Formal Aspects of Component Software, FACS 2011, held in Oslo, Norway in September 2011. </p><p>The 18 full paper… |
OL19850807W |
|
Frontiers in Algorithmics and Algorithmic Aspects in Information and Management
|
Michael Fellows |
This book constitutes the refereed proceedings of the 7th International Frontiers of Algorithmics Workshop, FAW 2013, and the 9th International Conference on Algorithmic Aspects in Information and Ma… |
OL19851497W |
|
Guide to Computer Network Security
|
Joseph Migga Kizza |
<p>With the growth of cloud computing, social networks, and ever more advanced mobile devices, information security and assurance has become more important than ever before.</p><p>This comprehensive … |
OL19854070W |
|
Handbook of Data Quality
|
Shazia Sadiq |
The issue of data quality is as old as data itself. However, the proliferation of diverse, large-scale and often publically available data on the Web has increased the risk of poor data quality and m… |
OL19854325W |
|
Information Assurance and Security Education and Training
|
Ronald C. Dodge |
This book constitutes the refereed proceedings of the 8th IFIP WG 11.8 World Conference on Security Education, WISE 8, held in Auckland, New Zealand, in July 2013. It also includes papers from WISE 6… |
OL19857418W |
|
Information Security Management & Small Systems Security
|
Jan H. P. Eloff |
This book presents a state-of-the-art review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. … |
OL19857526W |
|
Information Systems
|
R. Traunmüller |
This state-of-the art book deals with innovative trends in e-Commerce, e-Business and e-Government. Information Systems: The e-Business Challenge presents recent results of research and development i… |
OL19857573W |
|
Managing Requirements Knowledge
|
Walid Maalej |
Requirements engineering is one of the most complex and at the same time most crucial aspects of software engineering. It typically involves different stakeholders with different backgrounds. Constan… |
OL19885489W |
|
Open Source Software: Quality Verification
|
Etiel Petrinja |
This book constitutes the refereed proceedings of the 9th International IFIP WG 2.13 Conference on Open Source Systems, OSS 2013, held in Koper-Capodistria, Slovenia, in June 2013. The 18 revised ful… |
OL19892336W |
|
Practical Performance Modeling
|
Khalid Begain |
Practical Performance Modeling: Application of the MOSEL Language introduces the new and powerful performance and reliability modeling language MOSEL (MOdeling, Specification and Evaluation Language)… |
OL19896081W |
|
Product Lifecycle Management. Towards Knowledge-Rich Enterprises
|
Louis Rivest |
This book constitutes the refereed post-proceedings of the 9th IFIP WG 5.1 International Conference on Product Lifecycle Management, PLM 2012, held in Montreal, Canada, in July 2012. The 58 full pape… |
OL19897014W |