熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 40 筆, 頁數 1 / 1
呈現:
Secure Data Science: Integrating Cyber Security and Data Science
Secure data science, which integrates cyber security and data science, is becoming one of the critic... more |
|||
Identity, Power and Influence in the Boardroom: Actionable Strategies for Developing High Impact Directors and Boards
Over the last decade, the role of the board of directors in deciding on potentially value-creating d... more |
|||
Data Mining: Technologies, Techniques, Tools, and Trends
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its u... more |
|||
Design and Implementation of Data Mining Tools
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explai... more |
|||
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. ... more |
|||
XML Databases and the Semantic Web
Efficient access to data, sharing data, extracting information from data, and making use of the info... more |
|||
Identity, Power and Influence in the Boardroom: Actionable Strategies for Developing High Impact Directors and Boards
Over the last decade, the role of the board of directors in deciding on potentially value-creating d... more |
|||
Developing and Securing the Cloud
|
|||
Big Data Analytics with Applications in Insider Threat Detection
Today s malware mutates randomly to avoid detection, but reactively adaptive malware is more intelli... more |
|||
Analyzing and Securing Social Networks
Analyzing and Securing Social Networks focuses on the two major technologies that have been develope... more |
|||
Security and Privacy in Communication Networks: 11th International Conference, Securecomm 2015, Dallas, Tx, USA, October 26-29,
This volume constitutes the thoroughly refereed post-conference proceedings of the 11th Internationa... more |
|||
Developing and Securing the Cloud
Although the use of cloud computing platforms and applications has expanded rapidly, most books on t... more |
|||
The Secret Life of Decisions: How Unconscious Bias Subverts Your Judgement
impact our reasoning ability, raising our awareness of the many traps we can fall into. Meena Thuraisingham and her...... more |
|||
Data Mining Tools for Malware Detection
Although the use of data mining for security and malware detection is quickly on the rise, most book... more |
|||
Intelligence And Security Informatics: IEEE International Conference on Intelligence and Security Informatics, Isi 2006, San Die
In the past few years, intelligence and security informatics (ISI) research, which is concerned with... more |
|||
Security Management: Integrity, And Internal Control in Information Systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Confere
This is the first joint working conference between the IFIP Working Groups 11. 1 and 11. 5. We hope ... more |
|||
Web And Information Security
Web and Information Security consists of a collection of papers written by leading experts in the fi... more |
|||
Data Mining: Technologies, Techniques, Tools, and Trends
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its u... more |
|||
Multimedia Database Management Systems: Research Issues and Future Directions
|
|||
Multimedia Database Systems: Design and Implementation Strategies
|
|||
Heterogeneous Information Exchange and Organizational Hubs
|
|||
Heterogeneous Information Exchange and Organizational Hubs
|
|||
Multimedia Database Management Systems: Research Issues and Future Directions
|
|||
Analyzing and Securing Social Networks
|
|||
Big Data Analytics with Applications in Insider Threat Detection
|
|||
The Secret Life of Decisions: How Unconscious Bias Subverts Your Judgement
|
|||
Secure Data Provenance and Inference Control with Semantic Web
With an ever-increasing amount of information on the web, it is critical to understand the pedigree,... more |
|||
Secure Semantic Service-Oriented Systems
As the demand for data and information management continues to grow, so does the need to maintain an... more |
|||
Design and Implementation of Data Mining Tools
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explai... more |
|||
Building Trustworthy Semantic Webs
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. ... more |
|||
Web And Information Security
|
|||
Database And Applications Security: Integrating Information Security And Data Management
This is the first book to provide an in-depth coverage of all the developments, issues and challenge... more |
|||
Web Data Mining and Applications in Business Intelligence and Counter-Terrorism
The explosion of Web-based data has created a demand among executives and technologists for methods ... more |
|||
Knowledge Management: Classic and Contemporary Works
This book provides an introduction to the field of knowledge management. Taking a learning-centric r... more |
|||
Xml Databases and the Semantic Web
Efficient access to data, sharing data, extracting information from data, and making use of the info... more |
|||
Managing and Mining Multimedia Databases
There is now so much data on the Web that managing it with conventional tools is becoming almost imp... more |
|||
Web Data Management and Electronic Commerce
Effective electronic commerce requires integrating resources and extracting the critical information... more |
|||
Data Management Systems
As the information contained in databases has become a critical resource in organizations, efficient... more |
|||
Handbook of Trustworthy Federated Learning
This Handbook aims to serve as a one-stop, reliable resource, including curated surveys and exposito... more |
|||
Multimedia Database Systems: Design and Implementation Strategies
|