Cyber security research is one of the important areas in the computer science domain which also plays a major role in the life of almost every individual, enterprise, society and country, which this book illustrates.
This book offers an accessible introduction and practical guide to Voice over Internet Protocol (VoIP) technology, providing readers with the know-how to solve the problems encountered in applying VoIP technology across all types of network.
Vorwort Die Möglichkeiten zur Kontrolle komplexer Systeme, die die heutige Informations- und Kommunikationstechnik bietet, erlauben eine Kontrolle und zumindest zeitweise Beherr schung von Situationen und Zuständen, die ohne diese technische Hilfe kaum oder sogar überhaupt nicht zu bewältigen wären.
Inspiration for the wireless revolution The big Geneva Telecom 99 exhibition will probably go down in history as the moment when Wireless Application Protocol (WAP) made its debut in the world.
This book constitutes the refereed proceedings of the 24th International Conference on Information and Software Technologies, ICIST 2018, held in Vilnius, Lithuania, in October 2018.
This book constitutes the proceedings of the 17th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2018, held in Olomouc, Czech Republic, in September 2018.
This SpringerBrief provides an overview within data mining of spatiotemporal frequent pattern mining from evolving regions to the perspective of relationship modeling among the spatiotemporal objects, frequent pattern mining algorithms, and data access methodologies for mining algorithms.
This book constitutes revised selected papers from the 12th International Conference on Critical Information Infrastructures Security, CRITIS 201, held in Lucca, Italy, in October 2017.
This book constitutes the proceedings of the 13th International Conference on Cellular Automata for Research and Industry, ACRI 2018, held in Como, Italy, in September 2018.
These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic web, social networks, and multi-agent systems.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018.
This book constitutes the refereed proceedings of the 11th International Symposium on Algorithmic Game Theory, SAGT 2018, held in Beijing, China, in September 2018.
This book constitutes the proceedings of the Third International Conference on Interactive Collaborative Robotics, ICR 2018, held in Leipzig, Germany, in September 2018, as a satellite event of the 20th International Conference on Speech and Computer, SPECOM 2018.
This book constitutes the proceedings of the 20th International Conference on Speech and Computer, SPECOM 2018, held in Leipzig, Germany, in September 2018.
This book constitutes the refereed proceedings of the 10th International Conference on Reversible Computation, RC 2018, held in Leicester, UK, in September 2018.
This book constitutes the refereed proceedings of the 21th International Conference on Distributed and Computer and Communication Networks, DCCN 2018, held in Moscow, Russia, in September 2018.
This book constitutes the refereed proceedings of the 5th International Conference on Belief Functions, BELIEF 2018, held in Compiegne, France, in September 2018.
ADVANCES IN DIGITAL FORENSICS XIVEdited by: Gilbert Peterson and Sujeet ShenoiDigital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence.
This two volume set of LNAI 11061 and LNAI 11062 constitutes the refereed proceedings of the 11th International Conference on Knowledge Science, Engineering and Management, KSEM 2018, held in Changchun, China, in August 2018.
This book constitutes the proceedings of the 21st International Conference on Information Security, ISC 2018, held in Guildford, UK, in September 2018.
This book constitutes the refereed proceedings of the 37th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2018, held in Vasteras, Sweden, in September 2018.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.
This book constitutes the refereed proceedings of the 13th Colombian Conference on Computing, CCC 2018, held in Cartagena, Colombia, in September 2018.
The two-volume set, LNCS 11098 and LNCS 11099 constitutes the refereed proceedings of the 23nd European Symposium on Research in Computer Security, ESORICS 2018, held in Barcelona, Spain, in September 2018.