Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Computer Security -- ESORICS 2013: 18th European Symposium on Research in Computer Security

Buy

This book constitutes the refereed proceedings of the 18th European Symposium on Computer Security, ESORICS 2013, held in Egham, UK, in September 2013.

The 43 papers included in the book were carefully reviewed and selected from 242 papers. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together researchers in this area, by promoting the exchange of ideas with system developers and by encouraging links with researchers in related areas. The papers cover all topics related to security, privacy and trust in computer systems and networks.

(HTML tags aren't allowed.)

Peer-to-Peer Computing: Building Supercomputers with Web Technologies (Computer Communications and Networks)
Peer-to-Peer Computing: Building Supercomputers with Web Technologies (Computer Communications and Networks)
Client/Server architecture was first proposed in the late 1980s as an alternative to conventional mainframe systems. Mainframe processing quickly becomes a bottleneck in any information system, but client/server models shift the processing burden to the client computer. Through workload sharing, client/server systems can improve overall efficiency...
Science in the Age of Computer Simulation
Science in the Age of Computer Simulation

Computer simulation was first pioneered as a scientific tool in meteorology and nuclear physics in the period following World War II, but it has grown rapidly to become indispensible in a wide variety of scientific disciplines, including astrophysics, high-energy physics, climate science, engineering, ecology, and economics. Digital computer...

Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware
Remoting Patterns: Foundations of Enterprise, Internet and Realtime Distributed Object Middleware
Remoting offers developers many ways to customize the communications process, for efficiency, security, performance and power, and allows seamless integration of components running on several computers into a single application. This book exposes the full power of remoting to developers working in mixed platform environments in a way that will...

Web Archiving
Web Archiving
The public information available on the Web today is larger than information distributed on any other media. The raw nature of Web content, the unpredictable remote changes that can affect it, the wide variety of formats concerned, and the growth in data-driven websites make the preservation of this material a challenging task, requiring specific...
ARM Architecture Reference Manual
ARM Architecture Reference Manual
The ARM architecture is the industry's leading 16/32-bit embedded RISC processor solution. ARM Powered microprocessors are being routinely designed into a wider range of products than any other 32-bit processor. This wide applicability is made possible by the ARM architecture, resulting in optimal system solutions at the crossroads of high...
Apple Pro Training Series: Aperture 1.5
Apple Pro Training Series: Aperture 1.5
Now fully updated for version 1.5, this comprehensive book-DVD combo starts with the basics of image management and takes you step by step all the way through Aperture's powerful photo-editing, image-retouching, proofing, publishing, and archiving features. Version 1.5's new features are completely covered, including the new image editing tools,...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy