熱門搜尋
分類(單選) |
顯示所有篩選
|
---|---|
配送方式(可複選) | |
其他(可複選) |
搜尋結果共 78 筆, 頁數 1 / 2
呈現:
Beautyland
author of Parakeet, Marie-Helene Bertino’s Beautyland is a wise, tender novel about a woman who doesn’t feel at home on Earth...... more |
|||
Introduction to Nanotechnology
This textbook is conceived for a one-semester course at the upper undergraduate or freshman graduate... more |
|||
Introduction to Nanotechnology
This textbook is conceived for a one-semester course at the upper undergraduate or freshman graduate... more |
|||
Confessions to a Casino Joker - Entertainers
|
|||
Parakeet
Bertino’s Parakeet is a darkly funny and warm-hearted novel about a young woman whose dead grandmother (in the form of a...... more |
|||
Forensic Science: Fundamentals & Investigations
|
|||
The Overcomer in Christ
|
|||
Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Pap
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference pr... more |
|||
Cloud Computing and Security: Third International Conference, Icccs 2017, Nanjing, China, June 16-18, 2017, Revised Selected Pap
This two volume set LNCS 10602 and LNCS 10603 constitutes the thoroughly refereed post-conference pr... more |
|||
Pen America Best Debut Short Stories 2017
stories collected here--selected this year by judges Marie-Helene Bertino, Kelly Link, and Nina McConigley--take place in...... more |
|||
Cloud Computing and Security: Second International Conference, Icccs 2016, Nanjing, China, July 29-31, 2016, Proceedings
This two volume set LNCS 10039 and 10040 constitutes the refereed post-conference proceedings of the... more |
|||
Security for Web Services and Service-Oriented Architectures
Web services technologies are advancing fast and being extensively deployed in many di?erent applica... more |
|||
Homomorphic Encryption and Applications
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, app... more |
|||
Roles, Trust, and Reputation in Social Media Knowledge Markets: Theory and Methods
Knowledge and expertise, especially of the kind that can shape public opinion, have been traditional... more |
|||
RFID Security and Privacy
As a fast-evolving new area, RFID security and privacy has quickly grown from a hungry infant to an ... more |
|||
Private Information Retrieval
This book deals with Private Information Retrieval (PIR), a technique allowing a user to retrieve an... more |
|||
Pharmacogenomics: An Introduction and Clinical Perspective
Publisher’s Note: Products purchased from Third Party sellers are not guaranteed by the publisher fo... more |
|||
Network and System Security: 6th International Conference, Nss 2012, Wuyishan, Fujian, China, November 21-23, Proceedings
This book constitutes the refereed proceedings of the 6th International Conference on Network and Sy... more |
|||
Safe as Houses
Safe as Houses, the debut story collection of Marie-Helene Bertino, proves that not all homes are shelters. The titular...... more |
|||
Data Protection from Insider Threats
As data represent a key asset for today’s organizations, the problem of how to protect this data fro... more |
|||
Security for Web Services and Service-Oriented Architectures
Web services technologies are advancing fast and being extensively deployed in many di?erent applica... more |
|||
Collaborative Computing: Networking, Applications and Worksharing: 4th International Conference, CollaborateCom 2008 Orlando, FL
CollaborateCom is an annual international forum for dissemination of original ideas and research res... more |
|||
Trust Management III: Third IFIO WG 11.11 International Conference, IFIPTM 2009, West Lafayette, In, USA, June 15-19, 2009, Proc
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, ... more |
|||
Progress in WWW Research and Development: 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008, Proc
engineering technologies and research activities, not only in the Asia-Paci?c region but also in the... more |
|||
Advances in Spatial And Temporal Databases: 9th International Symposium, SSTD 2005, Angra Dos Reis, Brazil, August 22-24, 2005,
It is our great pleasure to introduce the papers of the proceedings of the 9th - ternational Symposi... more |
|||
Advances in Database Technology-Edbt 2004: 9th International Conference on Extending Database Technology : Herakleion, Crete, G
The 9th International Conference on Extending Database Technology, EDBT 2004, was held in Heraklion,... more |
|||
Inverse Projection Techniques: Old And New Approaches
|
|||
Methotrexate
Methotrexate: historical aspects.- Methotrexate, its mechanisms of action in malignant disease and m... more |
|||
Object-Oriented Methodologies and Systems: International Symposium, Isooms ’94, Palermo, Italy, September 21-22, 1994 : Proceed
This volume presents the proceedings of the International Symposium on Object-Oriented Methodologies... more |
|||
Cyber Security Meets Machine Learning
Chapter 1. IoT Attacks and Malware.- Chapter 2. Machine Learning-based Online Source Identification ... more |
|||
Computer Security - ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on ... more |
|||
Computer Security - ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part I
The two volume set LNCS 12972 + 12973 constitutes the proceedings of the 26th European Symposium on ... more |
|||
Cyber Security Meets Machine Learning
Chapter 1. IoT Attacks and Malware.- Chapter 2. Machine Learning-based Online Source Identification ... more |
|||
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part III
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th Internati... more |
|||
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th Internati... more |
|||
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I
The 3-volume set CCIS 1252 until CCIS 1254 constitutes the refereed proceedings of the 6th Internati... more |
|||
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part I
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International C... more |
|||
Artificial Intelligence and Security: 6th International Conference, Icais 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part II
This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International C... more |
|||
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part III
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th Interna... more |
|||
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part IV
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th Interna... more |
|||
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part II
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th Interna... more |
|||
Artificial Intelligence and Security: 5th International Conference, Icais 2019, New York, Ny, Usa, July 26-28, 2019, Proceedings, Part I
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th Interna... more |
|||
Policy-Based Autonomic Data Governance
|
|||
Cloud Computing and Security: 4th International Conference, Icccs 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part I
|
|||
Cloud Computing and Security: 4th International Conference, Icccs 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part VI
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of... more |
|||
Cloud Computing and Security: 4th International Conference, Icccs 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part V
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of... more |
|||
Cloud Computing and Security: 4th International Conference, Icccs 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part II
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of... more |
|||
Cloud Computing and Security: 4th International Conference, Icccs 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part III
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of... more |
|||
Cloud Computing and Security: 4th International Conference, Icccs 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part IV
This six volume set LNCS 11063 - 11068 constitutes the thoroughly refereed conference proceedings of... more |
|||
Roles, Trust, and Reputation in Social Media Knowledge Markets: Theory and Methods
Knowledge and expertise, especially of the kind that can shape public opinion, have been traditional... more |
|||
Distributed and Parallel Database Object Management
|
|||
Trust Management III: Third Ifip Wg 11.11 International Conference, Ifiptm 2009, West Lafayette, In, Usa, June 15-19, 2009, Proceedings
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, ... more |
|||
Journal on Data Semantics II
|
|||
Computer Security - Esorics 96: 4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings
|
|||
Distributed and Parallel Database Object Management
|
|||
Beautyland
|
|||
Machine Learning Techniques for Cybersecurity
|
|||
Machine Learning Techniques for Cybersecurity
This book explores machine learning (ML) defenses against the many cyberattacks that make our workpl... more |
|||
Forensic Science Fundamentals/ Investigations Se V2
With popular television programs, movies, and books about criminal justice and crime scene investiga... more |
|||
Parakeet
innermost thoughts." --Kristen Iversen, Refinery29 Acclaimed author of 2 A.M. at the Cat’s Pajamas Marie-Helene Bertino’s...... more |