Atjaunināt sīkdatņu piekrišanu

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI: Special Issue on Data and Security Engineering 1st ed. 2017 [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 193 pages, height x width: 235x155 mm, weight: 3168 g, 60 Illustrations, black and white; XI, 193 p. 60 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10720
  • Izdošanas datums: 07-Dec-2017
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662562650
  • ISBN-13: 9783662562659
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 193 pages, height x width: 235x155 mm, weight: 3168 g, 60 Illustrations, black and white; XI, 193 p. 60 illus., 1 Paperback / softback
  • Sērija : Lecture Notes in Computer Science 10720
  • Izdošanas datums: 07-Dec-2017
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3662562650
  • ISBN-13: 9783662562659
Citas grāmatas par šo tēmu:
This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016. Topics covered include big data analytics, massive dataset mining, security and privacy, cryptography, access control, deep learning, crowd sourcing, database watermarking, and query processing and optimization.

Risk-Based Privacy-Aware Access Control for Threat Detection Systems.- Systematic Digital Signing in Estonian e-Government Processes: Influencing Factors, Technologies, Change Management.- Towards a Fine-Grained Privacy-Enabled Attribute-Based Access Control Mechanism.- One-Class Collective Anomaly Detection Based on LSTM-RNNs.- Multihop Wireless Access Networks for Flood Mitigation Crowd-Sourcing Systems.- Assessment of Aviation Security Risk Management for Airline Turnaround Processes.- Scalable Automated Analysis of Access Control and Privacy Policies.- Partitioning-Insensitive Watermarking Approach for Distributed Relational Databases.