Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Nous utilisons des cookies dans le but suivant :
Assurer le bon fonctionnement du site web, améliorer la sécurité et prévenir la fraude
Avoir un aperçu de l'utilisation du site web, afin d'améliorer son contenu et ses fonctionnalités
Pouvoir vous montrer les publicités les plus pertinentes sur des plateformes externes
Club utilise des cookies et des technologies similaires pour faire fonctionner correctement le site web et vous fournir une meilleure expérience de navigation.
Ci-dessous vous pouvez choisir quels cookies vous souhaitez modifier :
Cookies techniques et fonctionnels
Ces cookies sont indispensables au bon fonctionnement du site internet et vous permettent par exemple de vous connecter. Vous ne pouvez pas désactiver ces cookies.
Cookies analytiques
Ces cookies collectent des informations anonymes sur l'utilisation de notre site web. De cette façon, nous pouvons mieux adapter le site web aux besoins des utilisateurs.
Cookies marketing
Ces cookies partagent votre comportement sur notre site web avec des parties externes, afin que vous puissiez voir des publicités plus pertinentes de Club sur des plateformes externes.
Une erreur est survenue, veuillez réessayer plus tard.
Il y a trop d’articles dans votre panier
Vous pouvez encoder maximum 250 articles dans votre panier en une fois. Supprimez certains articles de votre panier ou divisez votre commande en plusieurs commandes.
Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields of Communications and Mu...Savoir plus
Computer-Aided Innovation (CAI) is emerging as a strategic domain of research and application to support enterprises throughout the overall innovation...Savoir plus
Database and Application Security XV provides a forum for original research results, practical experiences, and innovative ideas in database and appli...Savoir plus
This volume constitutes the refereed proceedings of the 4th IFIP WG 5.4. Working Conference on Computer- Aided Innovation, CAI 2011, held in Strasbour...Savoir plus
The Eighth Annual Working Conference of Information Security Management and Small Systems Security, jointly presented by WG11.1 and WG11.2 of the Inte...Savoir plus
This book constitutes the refereed proceedings of the 8th European Lean Educator Conference ELEC 2022, which took place in Galway, Ireland, in Novembe...Savoir plus
Communication Systems: The State of the Art captures the depth and breadth of the field of communication systems: -Architectures and Protocols for Dis...Savoir plus
The two-volume set IFIP AICT 566 and 567 constitutes the refereed proceedings of the International IFIP WG 5.7 Conference on Advances in Production Ma...Savoir plus
This book constitutes the refereed proceedings of Industry Oriented Conferences held at IFIP 20th World Computer Congress in September 2008. The IFIP ...Savoir plus
Micro-assembly is a key enabling technology for cost effective manufacture of new generations of complex micro products. It is also a critical technol...Savoir plus
This book contains extended and revised versions of the best papers that have been presented during the twelfth edition of the IFIP TC10/WG10.5 Intern...Savoir plus
This book contains selected papers presented at the 15th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School on Privacy and Identity Man...Savoir plus
Given the pervasive nature of information technology and information systems in the modern world, the design and development of IS and IT are critical...Savoir plus
In modernity, an individual identity was constituted from civil society, while in a globalized network society, human identity, if it develops at all,...Savoir plus
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemi...Savoir plus
The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organis...Savoir plus
Changes in society resulting from the pervasiveness of information technology have produced positive and negative, intended and unintended consequence...Savoir plus
The purpose of this book is to discuss, in depth, the current state of research and practice in database security, to enable readers to expand their k...Savoir plus
This book constitutes the refereed post-proceedings of the 4th IFIP WG 9.7 Conference on the History of Nordic Computing, HiNC 4, held in Copenhagen, ...Savoir plus
This book constitutes the refereed proceedings of the 12th IFIP WG 5.11 International Symposium on Environmental Software Systems, ISESS 2017, held in...Savoir plus
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemi...Savoir plus
This book considers several aspects of providing quality education at a distance: -Quality of systems that support online learning, quality support in...Savoir plus
This book constitutes the refereed proceedings of the 8th IFIP TC 12 International Conference on Intelligent Information Processing, IIP 2014, held in...Savoir plus
This book records the very first Working Conference of the newly established IFIP Working Group on Human-Work Interaction Design, which was hosted by ...Savoir plus