top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings / / edited by Markus Jakobsson, Moti Yung, Jianying Zhou
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XIII, 511 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Information storage and retrieval systems
Application software
Electronic data processing—Management
Cryptology
Computer Communication Networks
Operating Systems
Information Storage and Retrieval
Computer and Information Systems Applications
IT Operations
ISBN 9783540248528
3-540-24852-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Storage -- CamouflageFS: Increasing the Effective Key Length in Cryptographic Filesystems on the Cheap -- Private Keyword-Based Push and Pull with Applications to Anonymous Communication -- Secure Conjunctive Keyword Search over Encrypted Data -- Provably Secure Constructions -- Evaluating Security of Voting Schemes in the Universal Composability Framework -- Verifiable Shuffles: A Formal Model and a Paillier-Based Efficient Construction with Provable Security -- On the Security of Cryptosystems with All-or-Nothing Transform -- Internet Security -- Centralized Management of Virtual Security Zones in IP Networks -- S-RIP: A Secure Distance Vector Routing Protocol -- A Pay-per-Use DoS Protection Mechanism for the Web -- Digital Signature -- Limited Verifier Signature from Bilinear Pairings -- Deniable Ring Authentication Revisited -- A Fully-Functional Group Signature Scheme over Only Known-Order Group -- Security Modelling -- Some Observations on Zap and Its Applications -- Security Measurements of Steganographic Systems -- X2Rep: Enhanced Trust Semantics for the XRep Protocol -- Authenticated Key Exchange -- One-Round Protocols for Two-Party Authenticated Key Exchange -- Password Authenticated Key Exchange Using Quadratic Residues -- Key Agreement Using Statically Keyed Authenticators -- Security of Deployed Systems -- Low-Latency Cryptographic Protection for SCADA Communications -- A Best Practice for Root CA Key Update in PKI -- SQLrand: Preventing SQL Injection Attacks -- Cryptosystems: Design and Analysis -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More Generalized Clock-Controlled Alternating Step Generator -- Cryptographic Protocols -- FDLKH: Fully Decentralized Key Management Scheme on Logical Key Hierarchy -- Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model -- Cryptanalysis of Two Anonymous Buyer-Seller Watermarking Protocols and an Improvement for True Anonymity -- Side Channels and Protocol Analysis -- Security Analysis of CRT-Based Cryptosystems -- Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits -- Weaknesses of a Password-Authenticated Key Exchange Protocol between Clients with Different Passwords -- Intrusion Detection and DoS -- Advanced Packet Marking Mechanism with Pushback for IP Traceback -- A Parallel Intrusion Detection System for High-Speed Networks -- A Novel Framework for Alert Correlation and Understanding -- Cryptographic Algorithms -- An Improved Algorithm for uP+vQ Using JSF -- New Table Look-Up Methods for Faster Frobenius Map Based Scalar Multiplication Over GF(p n ) -- Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions.
Record Nr. UNINA-9910144150803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Applied Cryptography and Network Security [[electronic resource] ] : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 440 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
IT Operations
ISBN 3-540-45203-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Record Nr. UNISA-996465773503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Applied Cryptography and Network Security : First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings / / edited by Jianying Zhou, Moti Yung, Yongfei Han
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 440 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Operating systems (Computers)
Computers and civilization
Electronic data processing—Management
Computer Communication Networks
Cryptology
Operating Systems
Computers and Society
IT Operations
ISBN 3-540-45203-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptographic Applications -- Multi-party Computation from Any Linear Secret Sharing Scheme Unconditionally Secure against Adaptive Adversary: The Zero-Error Case -- Optimized ? 2-Attack against RC6 -- Anonymity-Enhanced Pseudonym System -- Intrusion Detection -- Using Feedback to Improve Masquerade Detection -- Efficient Presentation of Multivariate Audit Data for Intrusion Detection of Web-Based Internet Services -- An IP Traceback Scheme Integrating DPM and PPM -- Cryptographic Algorithms -- Improved Scalable Hash Chain Traversal -- Round Optimal Distributed Key Generation of Threshold Cryptosystem Based on Discrete Logarithm Problem -- On the Security of Two Threshold Signature Schemes with Traceable Signers -- Digital Signature -- Proxy and Threshold One-Time Signatures -- A Threshold GQ Signature Scheme -- Generalized Key-Evolving Signature Schemes or How to Foil an Armed Adversary -- A Ring Signature Scheme Based on the Nyberg-Rueppel Signature Scheme -- Security Modelling -- Modelling and Evaluating Trust Relationships in Mobile Agents Based Systems -- An Authorization Model for E-consent Requirement in a Health Care Application -- PLI: A New Framework to Protect Digital Content for P2P Networks -- Web Security -- Improved Algebraic Traitor Tracing Scheme -- Common Vulnerability Markup Language -- Trust on Web Browser: Attack vs. Defense -- Security Protocols -- Security Protocols for Biometrics-Based Cardholder Authentication in Smartcards -- Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis -- Differential Fault Analysis on A.E.S -- Side-Channel Attack on Substitution Blocks -- Timing Attack against Implementation of a Parallel Algorithm for Modular Exponentiation -- A Fast Correlation Attack for LFSR-Based Stream Ciphers -- Key Management -- Making the Key Agreement Protocol in Mobile ad hoc Network More Efficient -- An Efficient Tree-Based Group Key Agreement Using Bilinear Map -- A Key Recovery Mechanism for Reliable Group Key Management -- Efficient Implementations -- Efficient Software Implementation of LFSR and Boolean Function and Its Application in Nonlinear Combiner Model -- Efficient Distributed Signcryption Scheme as Group Signcryption -- Architectural Enhancements for Montgomery Multiplication on Embedded RISC Processors.
Record Nr. UNINA-9910144033103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Biosurveillance and Biosecurity [[electronic resource] ] : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
Biosurveillance and Biosecurity [[electronic resource] ] : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (X, 183 p.)
Disciplina 362.1
Collana Lecture Notes in Bioinformatics
Soggetto topico Bioinformatics
Computers and civilization
Electronic data processing—Management
User interfaces (Computer systems)
Human-computer interaction
Database management
Computational and Systems Biology
Computers and Society
IT Operations
User Interfaces and Human Computer Interaction
Database Management
ISBN 3-540-89746-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Informatics Infrastructure and Policy Considerations -- Public Health Information Fusion for Situation Awareness -- Biosurveillance, Case Reporting, and Decision Support: Public Health Interactions with a Health Information Exchange -- Bio-surveillance Event Models, Open Source Intelligence, and the Semantic Web -- Foresight China II: Identification and Detection of Infectious Diseases -- Public Health Preparedness Informatics Infrastructure. A Case Study in Integrated Surveillance and Response: 2004–2005 National Influenza Vaccine Shortage -- Network-Based Data Analytics -- Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities -- Network-Based Analysis of Beijing SARS Data -- Tutte Polynomials and Topological Quantum Algorithms in Social Network Analysis for Epidemiology, Bio-surveillance and Bio-security -- Biosurveillance Models and Outbreak Detection -- Integrating a Commuting Model with the Bayesian Aerosol Release Detector -- A Temporal Extension of the Bayesian Aerosol Release Detector -- A Z-Score Based Multi-level Spatial Clustering Algorithm for the Detection of Disease Outbreaks -- Epidemic Thresholds in SIR and SIIR Models Applying an Algorithmic Method -- Test Power for Drug Abuse Surveillance -- Model Assessment and Case Studies -- Assessing the Accuracy of Spatiotemporal Epidemiological Models -- Simulation of Multivariate Spatial-Temporal Outbreak Data for Detection Algorithm Evaluation -- Analysis and Prediction of Epidemiological Trend of Scarlet Fever from 1957 to 2004 in the Downtown Area of Beijing -- Environmental Biosurveillance and Case Studies -- Environmental Biosurveillance for Epidemic Prediction: Experience with Rift Valley Fever -- Spatial Regression-Based Environmental Analysis in Infectious Disease Informatics.
Record Nr. UNISA-996465426603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Biosurveillance and Biosecurity : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
Biosurveillance and Biosecurity : International Workshop, BioSecure 2008, Raleigh, NC, USA, December 2, 2008. Proceedings / / edited by Daniel Zeng, Hsinchun Chen, Henry Rolka, William B. Lober
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (X, 183 p.)
Disciplina 362.1
Collana Lecture Notes in Bioinformatics
Soggetto topico Bioinformatics
Computers and civilization
Electronic data processing—Management
User interfaces (Computer systems)
Human-computer interaction
Database management
Computational and Systems Biology
Computers and Society
IT Operations
User Interfaces and Human Computer Interaction
Database Management
ISBN 3-540-89746-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Informatics Infrastructure and Policy Considerations -- Public Health Information Fusion for Situation Awareness -- Biosurveillance, Case Reporting, and Decision Support: Public Health Interactions with a Health Information Exchange -- Bio-surveillance Event Models, Open Source Intelligence, and the Semantic Web -- Foresight China II: Identification and Detection of Infectious Diseases -- Public Health Preparedness Informatics Infrastructure. A Case Study in Integrated Surveillance and Response: 2004–2005 National Influenza Vaccine Shortage -- Network-Based Data Analytics -- Dynamic Network Model for Predicting Occurrences of Salmonella at Food Facilities -- Network-Based Analysis of Beijing SARS Data -- Tutte Polynomials and Topological Quantum Algorithms in Social Network Analysis for Epidemiology, Bio-surveillance and Bio-security -- Biosurveillance Models and Outbreak Detection -- Integrating a Commuting Model with the Bayesian Aerosol Release Detector -- A Temporal Extension of the Bayesian Aerosol Release Detector -- A Z-Score Based Multi-level Spatial Clustering Algorithm for the Detection of Disease Outbreaks -- Epidemic Thresholds in SIR and SIIR Models Applying an Algorithmic Method -- Test Power for Drug Abuse Surveillance -- Model Assessment and Case Studies -- Assessing the Accuracy of Spatiotemporal Epidemiological Models -- Simulation of Multivariate Spatial-Temporal Outbreak Data for Detection Algorithm Evaluation -- Analysis and Prediction of Epidemiological Trend of Scarlet Fever from 1957 to 2004 in the Downtown Area of Beijing -- Environmental Biosurveillance and Case Studies -- Environmental Biosurveillance for Epidemic Prediction: Experience with Rift Valley Fever -- Spatial Regression-Based Environmental Analysis in Infectious Disease Informatics.
Record Nr. UNINA-9910483899003321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Business Process Management : Analysis, Modelling, Optimisation and Controlling of Processes / / by Andreas Gadatsch
Business Process Management : Analysis, Modelling, Optimisation and Controlling of Processes / / by Andreas Gadatsch
Autore Gadatsch Andreas
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (233 pages)
Disciplina 658.4038
Soggetto topico Electronic data processing—Management
Information technology—Management
Application software
IT Operations
Business Process Management
Computer and Information Systems Applications
ISBN 9783658415846
9783658415839
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction to business process management -- Concepts of business process management -- Organisation and introduction of business process management -- Process controlling -- Modelling and analysis of processes -- IT support for process management.
Record Nr. UNINA-9910728393603321
Gadatsch Andreas  
Wiesbaden : , : Springer Fachmedien Wiesbaden : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Collaborative Knowledge Management Through Product Lifecycle [[electronic resource] ] : A Computational Perspective / / by Hongwei Wang, Gongzhuang Peng
Collaborative Knowledge Management Through Product Lifecycle [[electronic resource] ] : A Computational Perspective / / by Hongwei Wang, Gongzhuang Peng
Autore Wang Hongwei
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (295 pages)
Disciplina 670.285
Altri autori (Persone) PengGongzhuang
Soggetto topico Computer-aided engineering
Engineering design
Electronic data processing—Management
Application software
Information storage and retrieval systems
Computer systems
Computer-Aided Engineering (CAD, CAE) and Design
Engineering Design
IT Operations
Computer and Information Systems Applications
Information Storage and Retrieval
Computer System Implementation
ISBN 981-19-9626-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Knowledge management through product lifecycle -- The collaborative knowledge management paradigm -- Knowledge modelling methods -- Advanced knowledge retrieval methods -- Knowledge reuse in collaborative knowledge management -- Discussion.
Record Nr. UNISA-996547967103316
Wang Hongwei  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Collaborative Knowledge Management Through Product Lifecycle : A Computational Perspective / / by Hongwei Wang, Gongzhuang Peng
Collaborative Knowledge Management Through Product Lifecycle : A Computational Perspective / / by Hongwei Wang, Gongzhuang Peng
Autore Wang Hongwei
Edizione [1st ed. 2023.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Descrizione fisica 1 online resource (295 pages)
Disciplina 670.285
Altri autori (Persone) PengGongzhuang
Soggetto topico Computer-aided engineering
Engineering design
Electronic data processing—Management
Application software
Information storage and retrieval systems
Computer systems
Computer-Aided Engineering (CAD, CAE) and Design
Engineering Design
IT Operations
Computer and Information Systems Applications
Information Storage and Retrieval
Computer System Implementation
ISBN 981-19-9626-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Knowledge management through product lifecycle -- The collaborative knowledge management paradigm -- Knowledge modelling methods -- Advanced knowledge retrieval methods -- Knowledge reuse in collaborative knowledge management -- Discussion.
Record Nr. UNINA-9910678245903321
Wang Hongwei  
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Computer Algebra in Scientific Computing [[electronic resource] ] : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings / / edited by Matthew England, Wolfram Koepf, Timur M. Sadykov, Werner M. Seiler, Evgenii V. Vorozhtsov
Computer Algebra in Scientific Computing [[electronic resource] ] : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings / / edited by Matthew England, Wolfram Koepf, Timur M. Sadykov, Werner M. Seiler, Evgenii V. Vorozhtsov
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 479 p. 718 illus., 21 illus. in color.)
Disciplina 005.1
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Algorithms
Software engineering
Computers, Special purpose
Electronic data processing—Management
Mathematics of Computing
Software Engineering
Special Purpose and Application-Based Systems
IT Operations
ISBN 3-030-26831-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466425203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Algebra in Scientific Computing : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings / / edited by Matthew England, Wolfram Koepf, Timur M. Sadykov, Werner M. Seiler, Evgenii V. Vorozhtsov
Computer Algebra in Scientific Computing : 21st International Workshop, CASC 2019, Moscow, Russia, August 26–30, 2019, Proceedings / / edited by Matthew England, Wolfram Koepf, Timur M. Sadykov, Werner M. Seiler, Evgenii V. Vorozhtsov
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 479 p. 718 illus., 21 illus. in color.)
Disciplina 005.1
004.0151
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science—Mathematics
Algorithms
Software engineering
Computers, Special purpose
Electronic data processing—Management
Mathematics of Computing
Software Engineering
Special Purpose and Application-Based Systems
IT Operations
ISBN 3-030-26831-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349305203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui