|
Encyclopedia of healthcare information systems
|
Nilmini Wickramasinghe,Eliezer Geisler |
"This book provides an extensive and rich compilation of international research, discussing the use, adoption, design, and diffusion of information communication technologies (ICTs) in healthcare, in… |
OL16933564W |
|
Intelligence and security informatics
|
Hsinchun Chen |
Intelligence and Security Informatics: Second Symposium on Intelligence and Security Informatics, ISI 2004, Tucson, AZ, USA, June 10-11, 2004. Proceedings<br />Author: Hsinchun Chen, Reagan Moore, Da… |
OL16993316W |
|
Information retrieval
|
William R. Hersh |
This work covers the theory, implementation and evaluation of information retrieval (IR) systems in health and biomedicine. The three sections cover the basic concepts of IR, the current state-of-the… |
OL18757577W |
|
Advances in Cryptology – ASIACRYPT 2012
|
Xiaoyun Wang |
<p>This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in… |
OL19824322W |
|
Data Privacy Management and Autonomous Spontaneous Security
|
Roberto Pietro |
This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Wor… |
OL19840128W |
|
Handbook of Data Quality
|
Shazia Sadiq |
The issue of data quality is as old as data itself. However, the proliferation of diverse, large-scale and often publically available data on the Web has increased the risk of poor data quality and m… |
OL19854325W |
|
Information Hiding
|
Matthias Kirchner |
This book contains the thoroughly refereed post-conference proceedings of the 14th Information Hiding Conference, IH 2012, held in Berkeley, CA, USA, in May 2012.The 18 revised full papers presented … |
OL19857453W |
|
Information Security Applications
|
Dong Hoon Lee |
This book constitutes the thoroughly refereed post-workshop proceedings of the 13th International Workshop on Information Security Applications, WISA 2012, held in Jeju Island, Korea, in August 2012.… |
OL19857525W |
|
Information Security Management & Small Systems Security
|
Jan H. P. Eloff |
This book presents a state-of-the-art review of current perspectives in information security management and small systems security, focusing on technical and functional as well as managerial issues. … |
OL19857526W |
|
Information Technology in Educational Management for the Schools of the Future
|
Alex C. W. Fung |
This book portrays the potential of Information Technology in the educational management of schools. It collates and presents research results from all over the world and discusses the latest develop… |
OL19857601W |
|
Perspectives on the Future of Software Engineering
|
Jürgen Münch |
The dependence on quality software in all areas of life is what makes software engineering a key discipline for today’s society. Thus, over the last few decades it has been increasingly recognized th… |
OL19894154W |
|
SAP on the Cloud
|
Michael Missbach |
This book provides an introduction to the various facets of building and operating an SAP infrastructure exploiting Cloud technologies. It describes and discusses the latest developments and challeng… |
OL19900621W |
|
Security and Privacy Protection in Information Processing Systems
|
Lech J. Janczewski |
This book constitutes the refereed proceedings of the 28th IFIP TC 11 International Information Security and Privacy Conference, SEC 2013, held in Auckland, New Zealand, in July 2013. The 31 revised … |
OL19901287W |
|
Security and Privacy in User Modeling
|
Jörg Schreck |
With a Foreword by Alfred Kobsa. The research on user modeling has developed a broad range of elaborated algorithms and techniques to support user adaptive applications with information about their u… |
OL19901289W |
|
Security and Trust Management
|
Audun Jøsang |
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in con… |
OL19901295W |
|
Smart Grid Security
|
Jorge Cuellar |
The engineering, deployment and security of the future smart grid will be an enormous project requiring the consensus of many stakeholders with different views on the security and privacy requirement… |
OL19902432W |
|
Software Quality and Productivity
|
Matthew Lee |
As the world becomes increasingly dependent on the use of computers, the need for quality software which can be produced at reasonable cost increases. This IFIP proceedings brings together the work o… |
OL19902791W |
|
Systems and Software Variability Management
|
Rafael Capilla |
The success of product line engineering techniques in the last 15 years has popularized the use of software variability as a key modeling approach for describing the commonality and variability of sy… |
OL19905486W |
|
Transactions on Computational Science XVII
|
Marina L. Gavrilova |
The LNCS journal Transactions on Computational Science reflects recent developments in the field of Computational Science, conceiving the field not as a mere ancillary science but rather as an innova… |
OL19907670W |
|
Transactions on Pattern Languages of Programming III
|
James Noble |
The Transactions on Pattern Languages of Programming subline aims to publish papers on patterns and pattern languages as applied to software design, development, and use, throughout all phases of the… |
OL19907685W |