Written by machine-learning researchers and members of the Android Security team, this all-star g...
Multimedia Information Systems brings together in oneplace important contributions and up-to-date...
Computational Analysis of Terrorist Groups: Lashkar-e-Taiba provides an in-depth look at Web inte...
With the rapid growth in the use of computers to manipulate, process, and reason about multimedia...
Multimedia Information Systems brings together in oneplace important contributions and up-to-date...
Search games and rendezvous problems have received growing attention in computer science within t...
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy 'This book present...
The importance and value of tracking and sharing the dispersed knowledge resources of contemporar...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
This open access book examines how the social sciences can be integrated into the praxis of engin...
This SpringerBrief proposes a general framework for reasoning about inconsistency in a wide varie...
This Springer Brief presents a basic algorithm that provides a correct solution to finding an opt...
Search games and rendezvous problems have received growing attention in computer science within t...
This timely resource brings child health to the forefront of global health and the crucial goal o...
Unser bisheriger Preis:ORGPRICE: 56,50 €
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
This is the first bookthat uses cyber-vulnerability data to explore the vulnerability of over fou...
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons...
This book constitutes the refereed proceedings of the First International Conference on Scalable ...
In recent years it has become popular among academics and consultants to talk about compensation ...
Terrorist groups throughout the world have been studied primarily through the use of social scien...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
Advance Praise for Indian Mujahideen: Computational Analysis and Public Policy 'This book present...
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial g...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
This edited volume features a wide spectrum of the latest computer science research relating to c...
This is the first study of Boko Haram that brings advanced data-driven, machine learning models t...
Counseling can go a long way in helping the employees to have better control over their lives, ta...
This is the first bookthat uses cyber-vulnerability data to explore the vulnerability of over fou...
Training programmes are expensive and there is a needto assess their effectiveness. The last stag...
Imagine yourself as a military officer in a conflict zone trying to identify locations of weapons...
The importance and value of tracking and sharing the dispersed knowledge resources of contemporar...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This edited volume features a wide spectrum of the latest computer science research relating to c...
Behavior is a complex element of human existence; it carries certain importance due to the nature...
Terrorist groups throughout the world have been studied primarily through the use of social scien...
This book constitutes the refereed proceedings of the 7th International Conference on Scalable Un...
Reine Nervensache! Unser Wissen über die kognitiven Funktionen des Menschen und ihre krankheitsbe...
Les programmes de formation sont coûteux et il est nécessaire d'évaluer leur efficacité. La derni...
Programy szkoleniowe s¿ drogie i trzeba oceni¿ ich skuteczno¿¿. Ostatni etap procesu szkolenia i ...
Opleidingsprogramma's zijn duur en de doeltreffendheid ervan moet worden beoordeeld. De laatste f...
I programmi di formazione sono costosi ed è necessario valutarne l'efficacia. L'ultima fase del p...
Programmy obucheniq dorogi, i neobhodimo oceniwat' ih äffektiwnost'. Poslednij ätap processa obuc...
Os programas de treinamento são caros e é necessário avaliar sua eficácia. A última etapa do proc...
Schulungsprogramme sind teuer und es besteht die Notwendigkeit, ihre Wirksamkeit zu bewerten. Die...
This is the first study of Boko Haram that brings advanced data-driven, machine learning models t...
This book analyzes the multimodal verbal and nonverbal behavior of humans in both an artificial g...
''With everyraindropsThousands of memories flowing.And there was a flood of pain again.''These co...