top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Achieving Success and Innovation in Global Sourcing: Perspectives and Practices : 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Achieving Success and Innovation in Global Sourcing: Perspectives and Practices : 9th Global Sourcing Workshop 2015, La Thuile, Italy, February 18-21, 2015, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (VIII, 251 p. 50 illus. in color.)
Disciplina 004
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic data processing - Management
Business information services
Computer industry
Industrial procurement
IT Operations
Enterprise Architecture
The Computer Industry
Procurement
ISBN 3-319-26739-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contents -- Software Sourcing Modes and Software Sourcing Gestalts -- Towards Model-based Strategic Sourcing -- The mediating effect of formal contractual controls in the relationship between experience and contract design -- Applying a Configurational Approach for Explaining the Role of Relationship Quality for Successful Outsourcing Arrangements -- The Role of Social Capital as Antecedent in Clan Formation in Information Systems Outsourcing Project -- Information Technology Outsourcing and the Bottom Line -- Riding for a fall in outsourced ISD: Knowledge transfer challenges between the onshore vendor and the offshored unit -- How to drive innovation within outsourcing relations: The role of performance evaluation and management control systems -- Innovation Offshoring by Small and Medium-Sized Enterprises – Establishing the Research Gap -- Understanding Collaboration in Multisourcing Arrangements: A Social Exchange Theory Perspective -- Multi-Sourcing Governance: in Perception and in Practice -- Using E-markets for globally distributed work -- Building a supply chain ecosystem: how the Enterprise Connectivity Interface (ECI) will enable and support interorganisational collaboration -- The importance of IT energy efficiency in outsourcing decision making: a survey in the Dutch outsourcing infrastructure market.
Record Nr. UNINA-9910299258503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 / / edited by Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
Advances in Ad Hoc Networking : Proceedings of the Seventh Annual Mediterranean Ad Hoc Networking Workshop, Palma de Mallorca, Spain, June 25-27, 2008 / / edited by Pedro Cuenca, Carlos Guerrero, Ramon Puigjaner, Bartomeu Serra
Edizione [1st ed. 2008.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (246 p.)
Disciplina 004.6
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer networks
Data structures (Computer science)
Information theory
Electronic data processing - Management
Computer Communication Networks
Data Structures and Information Theory
IT Operations
ISBN 9780387094908
0387094903
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Reconfiguration and Optimization Networks -- End To End QoS Mapping Between Metroethernet and WiMAX -- A Mobility Model for Personal Networks (PN) -- Replicated Random Walks for Service Advertising in Unstructured Environments -- Sensor Networks -- ACF: An Autonomic Communication Framework for Wireless Sensor Networks -- An Autonomous Energy-Aware Routing Scheme: a Supplementary Routing Approach for Path-Preserving Wireless Sensor Networks -- FlowerNet — How to design a user friendly Sensor Network -- Distributed Policy Management Protocol for Self-Configuring Mobile Ad Hoc Networks -- Routing Algorithms and Protocols I -- Performance Evaluation of a Protocol for Fair P2P Auctions over MANETs -- A Scalable Adaptation of the OLSR Protocol for Large Clustered Mobile Ad hoc Networks -- Security and Privacy -- Securing Multihop Vehicular Message Broadcast using Trust Sensors -- Scalable Exchange of Packet Counters in OLSR -- Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms -- Security for Context-Aware ad-hoc Networking Applications -- MAC Protocols -- No Ack in IEEE 802.11e Single-Hop Ad-Hoc VoIP Networks -- Constraining the network topology in IEEE 802.15.4 -- Throughput and Delay Bounds for Cognitive Transmissions -- Wireless Broadcast with Network Coding: Dynamic Rate Selection -- Routing Algorithms and Protocols II -- A Reactive Wireless Mesh Network Architecture -- MEA-DSR: A Multipath Energy-aware Routing Protocol for Wireless Ad Hoc Networks -- A New Energy Efficient Multicast Routing Approach in MANETs.
Record Nr. UNINA-9910483112703321
New York, NY : , : Springer US : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / / edited by Michael Wiener
Advances in Cryptology - CRYPTO '99 : 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings / / edited by Michael Wiener
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1999
Descrizione fisica 1 online resource (XII, 648 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data protection
Coding theory
Information theory
Cryptography
Data encryption (Computer science)
Algorithms
Electronic data processing - Management
Computer networks
Data and Information Security
Coding and Information Theory
Cryptology
IT Operations
Computer Communication Networks
ISBN 3-540-48405-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Public-Key Cryptanalysis I -- On the Security of RSA Padding -- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization -- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications -- Invited Lecture -- Information-Theoretic Cryptography -- Secure Communication and Computation -- Information Theoretically Secure Communication in the Limited Storage Space Model -- The All-or-Nothing Nature of Two-Party Secure Computation -- Distributed Cryptography -- Adaptive Security for Threshold Cryptosystems -- Two Party RSA Key Generation -- Robust Distributed Multiplication without Interaction -- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting -- Secret-Key Cryptography -- Truncated Differentials and Skipjack -- Fast Correlation Attacks Based on Turbo Code Techniques -- Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s Inequality -- Message Authentication Codes -- UMAC: Fast and Secure Message Authentication -- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions -- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions -- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier -- Public-Key Cryptanalysis II -- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97 -- Weakness in Quaternion Signatures -- Cryptanalysis of “2R” Schemes -- Factoring N = p r q for Large r -- Traitor Tracing -- An Efficient Public Key Traitor Tracing Scheme -- Dynamic Traitor Tracing -- Efficient Methods for Integrating Traceability and Broadcast Encryption -- Differential Power Analysis -- Differential Power Analysis -- Towards Sound Approaches to Counteract Power-Analysis Attacks -- Signature Schemes -- Separability andEfficiency for Generic Group Signature Schemes -- A Forward-Secure Digital Signature Scheme -- Abuse-Free Optimistic Contract Signing -- Zero Knowledge -- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK -- On Concurrent Zero-Knowledge with Pre-processing -- Asymmetric Encryption -- On the Security Properties of OAEP as an All-or-Nothing Transform -- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization -- Secure Integration of Asymmetric and Symmetric Encryption Schemes -- Electronic Cash -- Auditable, Anonymous Electronic Cash -- Protocols and Broadcasting -- Oblivious Transfer with Adaptive Queries -- Compressing Cryptographic Resources -- Coding Constructions for Blacklisting Problems without Computational Assumptions -- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Record Nr. UNINA-9910143649403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1999
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Advances in Cryptology – EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings / / edited by Christian Cachin, Jan Camenisch
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 630 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Algorithms
Computer science - Mathematics
Discrete mathematics
Electronic data processing - Management
Cryptology
Computer Communication Networks
Operating Systems
Discrete Mathematics in Computer Science
IT Operations
ISBN 1-280-30737-4
9786610307371
3-540-24676-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Private Computation -- Efficient Private Matching and Set Intersection -- Positive Results and Techniques for Obfuscation -- Secure Computation of the k th -Ranked Element -- Signatures I -- Short Signatures Without Random Oracles -- Sequential Aggregate Signatures from Trapdoor Permutations -- Unconditional Security -- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission -- The Exact Price for Unconditionally Secure Asymmetric Cryptography -- On Generating the Initial Key in the Bounded-Storage Model -- Distributed Cryptography -- Practical Large-Scale Distributed Key Generation -- Optimal Communication Complexity of Generic Multicast Key Distribution -- Foundations I -- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem -- Black-Box Composition Does Not Imply Adaptive Security -- Identity-Based Encryption -- Chosen-Ciphertext Security from Identity-Based Encryption -- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles -- Elliptic Curves -- Construction of Secure Random Curves of Genus 2 over Prime Fields -- Projective Coordinates Leak -- Signatures II -- Security Proofs for Identity-Based Identification and Signature Schemes -- Concurrent Signatures -- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures -- Public-Key Cryptography -- Public-Key Steganography -- Immunizing Encryption Schemes from Decryption Errors -- Secure Hashed Diffie-Hellman over Non-DDH Groups -- Foundations II -- On Simulation-Sound Trapdoor Commitments -- Hash Function Balance and Its Impact on Birthday Attacks -- Multiparty Computation -- Multi-party Computation with Hybrid Security -- On the Hardness of Information-Theoretic Multiparty Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition of Boolean Functions -- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited -- New Applications -- Public Key Encryption with Keyword Search -- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data -- Algorithms and Implementation -- Merkle Tree Traversal in Log Space and Time -- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3 -- Anonymity -- Traceable Signatures -- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme -- Anonymous Identification in Ad Hoc Groups.
Record Nr. UNINA-9910144186503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Advances in Global Sourcing. Models, Governance, and Relationships : 7th Global Sourcing Workshop 2013, Val d’Isère, France, March 11-14, 2013, Revised Selected Papers / / edited by Ilan Oshri, Julia Kotlarsky, Leslie P. Willcocks
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 223 p. 23 illus.)
Disciplina 658.054
Collana Lecture Notes in Business Information Processing
Soggetto topico Electronic data processing - Management
Software engineering
Industrial organization
Industrial procurement
IT Operations
Software Engineering
Organization
Procurement
ISBN 3-642-40951-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto IT Global Delivery Model Efficiency: An Exploratory Case Study to Identify Input and Output Factors -- Relative and Joint Dependence in IS Outsourcing Relationships – A Model of Effects on Relational Facets and Exchange Performance -- The Role of Organizational Standards in IT Outsourcing Relations -- Vendor Capabilities in ITO Research: A Systematization and Critical Review -- The Middle Management of Offshoring: Understanding Offshoring Strategy Implementation at a Meso Level -- Offshore BPO Decisions and Institutional Influence on Senior Managers -- Cloud Computing as Innovation: Studying Diffusion -- Towards Improvement of Information Systems Governance: Reorganization of Software Applications Hosting -- Coordinating Tensions in Orchestrating Blended Modes of Sharing and Outsourcing of Services -- Can Agile Software Tools Bring the Benefits of a Task Board to Globally Distributed Teams? -- KAIWA: Towards a Method for Knowledge Transfer in the Transition Phase of Offshore Outsourced Projects -- Opaque Indifference and Corporate Social Responsibility: A Moral License for Offshore BPO? -- Business Process Outsourcing in Suriname: Call Center Services.
Record Nr. UNINA-9910437958303321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings / / edited by Kanta Matsuura, Eiichiro Fujisaki
Advances in Information and Computer Security : Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings / / edited by Kanta Matsuura, Eiichiro Fujisaki
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XII, 299 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Operating systems (Computers)
Electronic data processing - Management
Computers and civilization
Computer networks
Algorithms
Data and Information Security
Operating Systems
IT Operations
Computers and Society
Computer Communication Networks
ISBN 3-540-89598-1
Classificazione 54.30
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptography -- On Generating Elements of Orders Dividing p 2k ±p k ?+?1 -- Chosen Ciphertext Secure Public Key Encryption with a Simple Structure -- Remarks on the Attack of Fouque et al. against the ?IC Scheme -- Signature and Signcryption -- Efficient Batch Verification of Short Signatures for a Single-Signer Setting without Random Oracles -- Signcryption Scheme in Multi-user Setting without Random Oracles -- Simple and Efficient Group Signature Scheme Assuming Tamperproof Devices -- Software Security -- The Superdiversifier: Peephole Individualization for Software Protection -- Detecting Java Theft Based on Static API Trace Birthmark -- Online Network Forensics for Automatic Repair Validation -- Return Value Predictability Profiles for Self–healing -- Privacy Protection and Contents Protection -- Involuntary Information Leakage in Social Network Services -- Privacy Preserving Computations without Public Key Cryptographic Operation -- A Novel Framework for Watermarking: The Data-Abstracted Approach -- Invited Talk -- The Elliptic Curve Discrete Logarithm Problem: State of the Art -- Authentication and Access Control -- An Application of the Boneh and Shacham Group Signature Scheme to Biometric Authentication -- Analysis of a Biometric Authentication Protocol for Signature Creation Application -- Efficient Secure Labeling Method under Dynamic XML Data Streams -- Implementation -- Bitstream Encryption and Authentication Using AES-GCM in Dynamically Reconfigurable Systems -- The Long-Short-Key Primitive and Its Applications to Key Security.
Record Nr. UNINA-9910484474203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information Systems Development : Exploring New Horizons and Opportunities / / edited by Bartosz Marcinkowski, Adam Przybyłek, Aleksander Jarzębowicz, Netta Iivari, Emilio Insfran, Michael Lang, Henry Linger, Christoph Schneider
Advances in Information Systems Development : Exploring New Horizons and Opportunities / / edited by Bartosz Marcinkowski, Adam Przybyłek, Aleksander Jarzębowicz, Netta Iivari, Emilio Insfran, Michael Lang, Henry Linger, Christoph Schneider
Edizione [1st ed. 2025.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Descrizione fisica 1 online resource (XXIX, 294 p. 54 illus., 42 illus. in color.)
Disciplina 658.4038
Collana Lecture Notes in Information Systems and Organisation
Soggetto topico Business information services
Software engineering - Management
Electronic data processing - Management
Application software
Business Information Systems
Software Management
IT Operations
Computer and Information Systems Applications
ISBN 3-031-87880-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Chapter 1. Scaling Product Acceptance Analysis Using Annotation Systems Based on Large Language Models -- Chapter 2. Strategies for Effective Remote Retrospectives: Exploring Retrospective Games, Anonymity, and Continuous Reflection -- Chapter 3. Self-Sovereign Identities: Brief History and Survey of the Field -- Chapter 4. A Framework for Rigorous Execution and Presentation of Expert Interviews in IS and Digital Transformation Research -- Chapter 5. Growing Pains of Digital Transformation: Navigating the Challenges in Non-Profits -- Chapter 6. Digital Innovation, Strategic and Lean Management as Success Factors in IT -- Chapter 7. A Solution for Developing Corpora for Polish Speech Enhancement in Complex Acoustic Environments -- Chapter 8. Data-Driven Assessment of Practical Skills in Cybersecurity Challenges -- Chapter 9. A Circular Digital Twin for Climate-Smart Soils through Community Composting -- Chapter 10. Design Principles for Food Heritage Digital Twins -- Chapter 11. Beyond Agile Methodologies: Exploring the Business Analyst’s Role in Agile Software Development -- Chapter 12. Assessing Operational Business-IT Alignment for Architecture Improvement -- Chapter 13. An EBNF-Based Grammar for Use Case Specification -- Chapter 14. Changes in Node.js Server-Side Application Performance Characteristics Over Time Under Load.
Record Nr. UNINA-9911007485803321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2025
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Information Systems Development : Information Systems Development, Organizational Aspects, and Societal Trends / / edited by Alberto Rodrigues da Silva, Miguel Mira da Silva, Jacinto Estima, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
Advances in Information Systems Development : Information Systems Development, Organizational Aspects, and Societal Trends / / edited by Alberto Rodrigues da Silva, Miguel Mira da Silva, Jacinto Estima, Chris Barry, Michael Lang, Henry Linger, Christoph Schneider
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (232 pages)
Disciplina 004
Collana Lecture Notes in Information Systems and Organisation
Soggetto topico Business information services
Electronic data processing - Management
Application software
Database management
IT in Business
IT Operations
Computer and Information Systems Applications
Database Management System
ISBN 3-031-57189-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Core Operational Business-IT Alignment: Current Trends and Open Challenges -- Unveiling the User Experience: A Synthesis of Cognitive Neuroscience Methods in Digital Product Design -- A New Architecture for Data Analysis on Blockchain Without Data Replication -- Exploring Barriers and Engagement in Digital Workplaces: An Analysis Spanning the Periods Before, During, and After COVID -- The Influence of Hybrid Agile-adaptive and Traditional IT Governance Mechanisms on Digital Transformation and Organizational Performance in the Indonesian Banking and Insurance Industries -- Does participation matter? Exploring upper secondary school students’ expectations and perceptions of value in is outreach programs -- Ontology-based Digital Twin Framework Using Contextual Affordances for Worker Assistance in Smart Factories -- Enriched Discretisation: Information Fusion from Supervised and Unsupervised Processing -- The Neural Network Regression Model Supported by Multi-Criteria Methods for Ranking Prediction in Sustainable Development Assessment -- Emerging Trends in XR-mediated Virtual Team Collaboration in Digital Workspaces: A Systematic Literature Review.
Record Nr. UNINA-9910874666903321
Cham : , : Springer Nature Switzerland : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Learning Software Organizations : 6th International Workshop, LSO 2004, Banff, Canada, June 20-21, 2004, Proceedings / / edited by Grigori Melnik, Harald Holz
Advances in Learning Software Organizations : 6th International Workshop, LSO 2004, Banff, Canada, June 20-21, 2004, Proceedings / / edited by Grigori Melnik, Harald Holz
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (X, 174 p.)
Disciplina 005.1
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Electronic data processing - Management
User interfaces (Computer systems)
Human-computer interaction
Artificial intelligence
Education - Data processing
Software Engineering
IT Operations
User Interfaces and Human Computer Interaction
Artificial Intelligence
Computers and Education
ISBN 1-280-30783-8
9786610307838
3-540-25983-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Research on Learning Software Organizations – Past, Present, and Future -- Experience-Based Information Systems -- Learning How to Manage Risks Using Organizational Knowledge -- Building Ontology Based Tools for a Software Development Environment -- REBUILDER: A CBR Approach to Knowledge Management in Software Design -- COTS Evaluation Supported by Knowledge Bases -- Embedding Experiences in Micro-didactical Arrangements -- Software Maintenance -- Learning Software Maintenance Organizations -- How to Manage Knowledge in the Software Maintenance Process -- Learning from HOMER, a Case-Based Help Desk Support System -- Communities of Practice -- Tool Support for Inter-team Learning in Agile Software Organizations -- Knowledge Acquisition and Communities of Practice: An Approach to Convert Individual Knowledge into Multi-organizational Knowledge -- Impreciseness and Its Value from the Perspective of Software Organizations and Learning -- Planning LSOs -- A Framework for Managing Concurrent Business and ICT Development -- Case Studies and Experience Reports -- Agile Knowledge Management in Practice -- Co-knowledge Acquisition of Software Organizations and Academia -- Effects of Software Process in Organization Development – A Case Study -- Knowledge Networks – Managing Collaborative Knowledge Spaces.
Record Nr. UNINA-9910144151203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Advances in Network and Distributed Systems Security [[electronic resource] ] : IFIP TC11 WG11.4 First Annual Working Conference on Network Security November 26–27, 2001, Leuven, Belgium / / edited by Bart De Decker, Frank Piessens, Jan Smits, Els Van Herreweghen
Edizione [1st ed. 2002.]
Pubbl/distr/stampa New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (218 p.)
Disciplina 005.8
Altri autori (Persone) DeckerBart de <1958->
Collana IFIP Advances in Information and Communication Technology
Soggetto topico Computer science
Microprocessors
Computer architecture
Computer networks
Electronic commerce
Electronic data processing - Management
Theory of Computation
Processor Architectures
Computer Communication Networks
e-Commerce and e-Business
IT Operations
ISBN 1-280-20490-7
9786610204908
0-306-46958-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Role-based Specification of the SET Payment Transaction Protocol -- Information Security: Mutual Authentication in E-commerce -- Software-based Receipt-freeness in On-line Elections -- ID-based Structured Multisignature Schemes -- Probabilistic Relations for the Solitaire Keystream Generator -- Hazard Analysis for Security Protocol Requirements -- Securing RMI Communication -- Secure Java Development with UML -- Security Through Aspect-oriented Programming -- Extending a Campus Network with Remote Bubbles Using IPsec -- Combining World Wide Web and Wireless Security -- On Mobile Agent Based Transactions in Moderately Hostile Environments -- Sparta -- Shell’s Trust Domain Infrastructure Security Certification.
Record Nr. UNINA-9910780042403321
New York, NY : , : Springer US : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui