Atjaunināt sīkdatņu piekrišanu

E-grāmata: E-Business and Telecommunications: 18th International Conference, ICETE 2021, Virtual Event, July 6-9, 2021, Revised Selected Papers

  • Formāts - EPUB+DRM
  • Cena: 83,27 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

The present book includes extended and revised versions of a set of selected papers presented at the 18th International Joint Conference on e-Business and Telecommunications, ICETE 2021, held as an online web-based event (due to the COVID-19 pandemic) in July 2021.

The 17 full papers included in this book were carefully reviewed and selected from 197 submissions. They were organized in topical sections as follows: e-Business and security and cryptography.
e-Business.- The Digital Content Formation Labor Costs for Electronic
Libraries and Examples of the Formation of Virtual Exhibitions.- An Analysis
of Cultural Content on Short Video Platforms: Cultural Protection
Perspective.- Technology Transfer and Valuation Methods in Use by
University Technology Transfer Offices.- Improved Protection of User Data
through the Use of a Traceable Anonymous One Time Password.- Gamified
Self-paced E-Learning: Two Iterations of an Educational Design
Experiment.- Digital Transformation and Management of Transfer in
University Platforms.- A Method for Bottleneck Detection, Prediction, and
Recommendation using Process Mining Techniques.- Security and
Cryptography.- A Classification of Software-architectural Uncertainty
regarding Confidentiality.- Zero-Knowledge Predicates for Hashing to Prime:
Theory and Applications.- Improving Time Complexity andUtility of k-anonymous
Microaggregation.- Extended Formal Analysis of the EDHOC Protocol in
Tamarin.- Putting the Pieces Together: Model-based Engineering Workflows
for Attribute-based Access Control Policies.- Evaluating Defensive
Countermeasures for Software-based Hardware Abstraction.- Trace Recovery:
Attacking and Defending the User Privacy in Smart Meter Data Analytics.- On
Applying Boolean Masking to Exponents.- Trusted Implementation and
Enforcement of Application-specific Security Policies.- Selective Encryption
for Owners' Control in Digital Data Markets.