🍂 Autumn reading time! Let our AI Librarian find your perfect cozy read 🫖
Explore the literary world of this author
Although the use of cloud computing platforms and applications has expanded rapidly, most books on the subject focus on high-level concepts. There has...
As the demand for data and information management continues to grow, so does the need to maintain and improve the security of databases, applications,...
"This book covers basic concepts of web and information system security and provides new insights into the semantic web field and its related security...
Integrating Cyber Security and Data Science
Secure data science, which integrates cyber security and data science, is becoming one of the critical areas in both cyber security and data science. ...
Integrating Information Security and Data Management
This is the first book to provide an in-depth coverage of all the developments, issues and challenges in secure databases and applications. It provide...
Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defens...
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mini...
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical di...
Technologies, Techniques, Tools, and Trends
Focusing on a data-centric perspective, this book provides a complete overview of data mining: its uses, methods, current technologies, commercial pro...
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provena...
Semantic Webs promise to revolutionize the way computers find and integrate data over the internet. They will allow Web agents to share and reuse data...
The explosion of Web-based data has created a demand among executives and technologists for methods to identify, gather, analyze, and utilize data tha...
Focusing on three applications of data mining, Design and Implementation of Data Mining Tools explains how to create and employ systems and tools for ...
There is now so much data on the Web that managing it with conventional tools is becoming almost impossible. To manage this data, provide interoperabi...
Evolution and Interoperation
As the information contained in databases has become a critical resource in organizations, efficient access to that information and the ability to sha...
Effective electronic commerce requires integrating resources and extracting the critical information from across Web sites. From the recent efforts to...
...
Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington, DC, USA, 26 September 1993
This volume contains papers from the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, held in Washington DC, USA, on 26 Septembe...
Cyberdefense and Cyber Operations
Proceedings of the OOPSLA-93 Conference Workshop on Security for Object-Oriented Systems, Washington DC, USA, 26 September 1993