Operating systems Books

Sidebar Sidebar Sidebar
  • Middleware 2008 Middleware 2008
    Add to Cart The item has been added

    Middleware 2008

    This volume contains the proceedings of the International Middleware Con- rence, held in Leuven, Belgium during December 1-4, 2008. This year marked the ninth rendition of this annual conference in its current format initially...
    $116.00

    Add to Cart The item has been added
  • Architecture of Computing Systems - ARCS 2007 Architecture of Computing Systems - ARCS 2007
    Add to Cart The item has been added

    Architecture of Computing Systems - ARCS 2007

    This book constitutes the refereed proceedings of the 20th International Conference on Architecture of Computing Systems, ARCS 2007, held in Zurich, Switzerland in March 2007. Coverage details a broad range of research topics...
    $122.00

    Add to Cart The item has been added
  • Advances in Grid and Pervasive Computing Advances in Grid and Pervasive Computing
    Add to Cart The item has been added

    Advances in Grid and Pervasive Computing

    Welcome to the proceedings of the 2008 International Conference on Grid and Pervasive Computing (GPC 2008) which was held in Kunming, Yunnan, China, May 25-28, 2008. Gridcomputing presentsa newtrendindistributed computing...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2000 Advances in Cryptology - EUROCRYPT 2000
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2000

    EUROCRYPT 2000, the nineteenth annual Eurocrypt Conference, was sp- sored by the International Association for Cryptologic Research (IACR), in - operation with the Katholieke Universiteit Leuven in Belgium (research group for...
    $184.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT'99 Advances in Cryptology - ASIACRYPT'99
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT'99

    Asiacrypt'99 was held in Singapore on 14-18 November 1999. Asiacrypt is one of the major events in the cryptology research community. Asiacrypt'99, the ?fth annual Asiacrypt conference, was sponsored by the Asiacrypt Steering...
    $122.00

    Add to Cart The item has been added
  • Secure Networking - CQRE (Secure) '99 Secure Networking - CQRE (Secure) '99
    Add to Cart The item has been added

    Secure Networking - CQRE (Secure) '99

    The CQRE [Secure] conference provides a new international forum giving a close-up view on information security in the context of rapidly evolving economic processes. The unprecedented reliance on computer technology has...
    $122.00

    Add to Cart The item has been added
  • Advances in Cryptology Asiacrypt 98 Advances in Cryptology Asiacrypt 98
    Add to Cart The item has been added

    Advances in Cryptology Asiacrypt 98

    ASIACRYPT'98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the...
    $92.00

    Add to Cart The item has been added
  • Worldwide Computing and Its Applications - WWCA'98 Worldwide Computing and Its Applications - WWCA'98
    Add to Cart The item has been added

    Worldwide Computing and Its Applications - WWCA'98

    This book constitutes the refereed proceedings of the Second International Conference on Worldwide Computing and Its Applications, WWCA'98, held in Tsukuba, Japan, in March 1998. This volume presents 14 invited and survey...
    $92.00

    Add to Cart The item has been added
  • Distributed Algorithms Distributed Algorithms
    Add to Cart The item has been added

    Distributed Algorithms

    This book includes the papers presented at the Third International Workshop on Distributed Algorithms organized at La Colle-sur-Loup, near Nice, France, September 26-28, 1989 which followed the first two successful ...
    $116.00

    Add to Cart The item has been added
  • Advances in Petri Nets 1988 Advances in Petri Nets 1988
    Add to Cart The item has been added

    Advances in Petri Nets 1988

    The idea behind the series of volumes Advances in Petri Nets is to present to the general computer science community recent results which are the most representative and significant for the development in this area. The main ...
    $116.00

    Add to Cart The item has been added
  • Large Scale Management of Distributed Systems Large Scale Management of Distributed Systems
    Add to Cart The item has been added

    Large Scale Management of Distributed Systems

    This book constitutes the refereed proceedings of the 17th IFIP/IEEE International Workshop on Distributed Systems, Operations and Management, DSOM 2006, held in Dublin, Ireland in October 2006 in the course of the 2nd...
    $122.00

    Add to Cart The item has been added
  • Fault Diagnosis and Tolerance in Cryptography Fault Diagnosis and Tolerance in Cryptography
    Add to Cart The item has been added

    Fault Diagnosis and Tolerance in Cryptography

    This book constitutes the refereed proceedings of the Third International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2006, held in Yokohama, Japan in October 2006. The 12 revised papers of FDTC 2006 are...
    $116.00

    Add to Cart The item has been added
  • Middleware 2006 Middleware 2006
    Add to Cart The item has been added

    Middleware 2006

    This book constitutes the refereed proceedings of the ACM/IFIP/USENIX 7th International Middleware Conference 2006, held in Melbourne, Australia, in November/December 2006. The 21 revised full papers are organized in topical...
    $122.00

    Add to Cart The item has been added
  • Provenance and Annotation of Data Provenance and Annotation of Data
    Add to Cart The item has been added

    Provenance and Annotation of Data

    This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, IPAW 2006, held in Chicago, Il, USA in May 2006. The 26 revised full papers presented together with two...
    $122.00

    Add to Cart The item has been added
  • Computer Security - ESORICS 2006 Computer Security - ESORICS 2006
    Add to Cart The item has been added

    Computer Security - ESORICS 2006

    This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. The 32 revised full papers presented were carefully reviewed and selected from 160 submissions...
    $227.00

    Add to Cart The item has been added
  • Peer-to-Peer Systems Peer-to-Peer Systems
    Add to Cart The item has been added

    Peer-to-Peer Systems

    Peer-to-peer has emerged as a promising new paradigm for large-scale distributed computing. The International Workshop on Peer-to-Peer Systems (IPTPS) aimed to provide a forum for researchers active in peer-to-peer computing to...
    $92.00

    Add to Cart The item has been added
  • Grid Computing Security Grid Computing Security
    Add to Cart The item has been added

    Grid Computing Security

    Based on research and industry experience, this book structures the issues pertaining to grid computing security into three main categories: architecture-related, infrastructure-related, and management-related issues. It...
    $116.00

    Add to Cart The item has been added
  • Computer Security -- ESORICS 2002 Computer Security -- ESORICS 2002
    Add to Cart The item has been added

    Computer Security -- ESORICS 2002

    ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations...
    $116.00

    Add to Cart The item has been added
  • Infrastructure Security Infrastructure Security
    Add to Cart The item has been added

    Infrastructure Security

    Infrastructure Security Conference 2002 (InfraSec 2002) was created to promote security research and the development of practical solutions in the security of infrastructures - both government and commercial - such as the...
    $122.00

    Add to Cart The item has been added
  • UbiComp 2002 UbiComp 2002
    Add to Cart The item has been added

    UbiComp 2002

    Ubiquitous computing is coming of age. In the few short years of the lifetime of this conference, we have seen major changes in our emerging research community. When the conference started in 1999, as Handheld and Ubiquitous...
    $92.00

    Add to Cart The item has been added
  • Advanced Internet Services and Applications Advanced Internet Services and Applications
    Add to Cart The item has been added

    Advanced Internet Services and Applications

    The rapid growth of the Internet and related services is changing the way we work, act, and even think in a manner that far exceeds the prediction set by ?eld experts not long ago. It is now common belief that the Internet and...
    $92.00

    Add to Cart The item has been added
  • Protocols for High Speed Networks Protocols for High Speed Networks
    Add to Cart The item has been added

    Protocols for High Speed Networks

    This workshop on "Protocols for High-Speed Networks" is the seventh in a s- cessful series of international workshops, well known for their small and focused target audience, that provide a sound basis for intensive discussions...
    $122.00

    Add to Cart The item has been added
  • Security and Privacy in Digital Rights Management Security and Privacy in Digital Rights Management
    Add to Cart The item has been added

    Security and Privacy in Digital Rights Management

    The ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with refereed proceedings devoted solely to this topic. The workshop was held in conjunction with the Eighth ACM Conference on...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2002 Advances in Cryptology - EUROCRYPT 2002
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2002

    This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002.The 33 revised full...
    $220.00

    Add to Cart The item has been added
  • Networked Group Communication Networked Group Communication
    Add to Cart The item has been added

    Networked Group Communication

    Thisyear'sInternationalWorkshopon NetworkedGroupCommunications(NGC) was the third event in the NGC series following successful workshops in Pisa, Italy(1999),andStanford,CA,USA(2000). ...
    $122.00

    Add to Cart The item has been added
  • Theoretical Aspects of Computer Software Theoretical Aspects of Computer Software
    Add to Cart The item has been added

    Theoretical Aspects of Computer Software

    This volume constitutes the proceedings of the Fourth International Symposium on Theoretical Aspects of Computer Software (TACS 2001) held at Tohoku U- versity, Sendai, Japan in October 2001. The TACS symposium focuses on the...
    $122.00

    Add to Cart The item has been added
  • Embedded Software Embedded Software
    Add to Cart The item has been added

    Embedded Software

    This volume contains the proceedings of EMSOFT 2001, the First International Workshop on Embedded Software. The workshop was organized October 8-10, 2001, at Tahoe City, California. The steering committee of the workshop has...
    $116.00

    Add to Cart The item has been added
  • Ubicomp 2001 Ubicomp 2001
    Add to Cart The item has been added

    Ubicomp 2001

    This book constitutes the refereed proceedings of the Third International Conference on Ubiquitous Computing, Ubicomp 2001, held in Atlanta, GA, USA in September/October 2001. The 14 revised full papers and 15 revised technical...
    $92.00

    Add to Cart The item has been added
  • Peer-to-Peer Systems IV Peer-to-Peer Systems IV
    Add to Cart The item has been added

    Peer-to-Peer Systems IV

    The4th InternationalWorkshoponPeer-to-PeerSystemswasheld atCornellon February 24th and 25th 2005.The IPTPS workshopcontinued to bring together researchersand practitioners from a variety of disciplines, including networking,...
    $122.00

    Add to Cart The item has been added
  • Architecting Dependable Systems III Architecting Dependable Systems III
    Add to Cart The item has been added

    Architecting Dependable Systems III

    As software systems become ubiquitous, the issues of dependability become more and more crucial. Given that solutions to these issues must be considered from the very beginning of the design process, it is reasonable that...
    $92.00

    Add to Cart The item has been added
  • Computer Security - ESORICS 2005 Computer Security - ESORICS 2005
    Add to Cart The item has been added

    Computer Security - ESORICS 2005

    Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12-14, 2005 in Milan, Italy. In response...
    $92.00

    Add to Cart The item has been added
  • UbiComp 2005 UbiComp 2005
    Add to Cart The item has been added

    UbiComp 2005

    The 7th International Conference on Ubiquitous Computing (UbiComp 2005) marked the ?rst time that this premier venue for original research contributions in ubiquitous computing was held in Asia. The Tokyo, Japan venue re?ects...
    $122.00

    Add to Cart The item has been added
  • Multicriteria Scheduling Multicriteria Scheduling
    Add to Cart The item has been added

    Multicriteria Scheduling

    Scheduling and multicriteria optimisation theory have been subject, separately, to numerous studies. Since the last twenty years, multicriteria scheduling problems have been subject to a growing interest. However, a gap between...
    $227.00

    Add to Cart The item has been added
  • Embedded Software and Systems Embedded Software and Systems
    Add to Cart The item has been added

    Embedded Software and Systems

    Welcome to the post proceedings of the First International Conference on Embedded Software and Systems (ICESS 2004), which was held in Hangzhou, P. R. China, 9-10 December 2004. Embedded Software and Systems technology is of...
    $227.00

    Add to Cart The item has been added
  • Trust, Privacy, and Security in Digital Business Trust, Privacy, and Security in Digital Business
    Add to Cart The item has been added

    Trust, Privacy, and Security in Digital Business

    Sincerely welcome to the proceedings of the 2nd International Conference on Trust, Privacy, would be and Security in Digital Business, held in Copenhagen, Denmark, from August 22nd till 26th, 2005. This conference was the...
    $92.00

    Add to Cart The item has been added
Operating systems