Operating systems Books

Sidebar Sidebar Sidebar
  • Financial Cryptography and Data Security Financial Cryptography and Data Security
    Add to Cart The item has been added

    Financial Cryptography and Data Security

    The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica from February 28 to March 3, 2005. This conference, organized by the International Financial...
    $92.00

    Add to Cart The item has been added
  • Distributed Computing in Sensor Systems Distributed Computing in Sensor Systems
    Add to Cart The item has been added

    Distributed Computing in Sensor Systems

    The book constitutes the refereed proceedings of the First International Conference on Distributed Computing in Sensor Systems, DCOSS 2005, held in Marina del Rey, California, USA in June/July 2005. The 26 revised full papers...
    $92.00

    Add to Cart The item has been added
  • Quality of Service - IWQoS 2005 Quality of Service - IWQoS 2005
    Add to Cart The item has been added

    Quality of Service - IWQoS 2005

    We welcome you to the proceedings of IWQoS 2005 held at the University of Passau, in the beautiful state of Bavaria, Germany. We hope that all attendees enjoyed their time in that ancient and historic city. Quality of ...
    $122.00

    Add to Cart The item has been added
  • Applications and Theory of Petri Nets 2005 Applications and Theory of Petri Nets 2005
    Add to Cart The item has been added

    Applications and Theory of Petri Nets 2005

    This volume contains the proceedings of the 26th International Conference on Application and Theory of Petri Nets and Other Models of Concurrency (ICATPN 2005). The Petri net conferences serve to discuss yearly progress in the...
    $122.00

    Add to Cart The item has been added
  • Information Security and Cryptology - ICISC 2004 Information Security and Cryptology - ICISC 2004
    Add to Cart The item has been added

    Information Security and Cryptology - ICISC 2004

    The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information Security and Cryptology (KIISC) and was sponsored by the Ministry of Information and Communi- tion of...
    $184.00

    Add to Cart The item has been added
  • Human Interactive Proofs Human Interactive Proofs
    Add to Cart The item has been added

    Human Interactive Proofs

    E-commerce services are su?ering abuse by programs (bots, spiders, etc.) m- querading as legitimate human users. E?orts to defend against such attacks have, over the past several years, stimulated investigations into a new...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology - EUROCRYPT 2005 Advances in Cryptology - EUROCRYPT 2005
    Add to Cart The item has been added

    Advances in Cryptology - EUROCRYPT 2005

    These are the proceedings of the 24th Annual IACR Eurocrypt Conference. The conference was sponsored by the International Association for Cryptologic Research(IACR;seewww.iacr.org),thisyearincooperationwiththeComputer Science...
    $184.00

    Add to Cart The item has been added
  • Scientific Applications of Grid Computing Scientific Applications of Grid Computing
    Add to Cart The item has been added

    Scientific Applications of Grid Computing

    We wish to extend a warm welcome to the reader of this extended postp- ceedings publication of SAG 2004, the 1st International Workshop on Scienti?c Applications on Grid Computing. This workshop was held in September 2004, in...
    $116.00

    Add to Cart The item has been added
  • Information Security Practice and Experience Information Security Practice and Experience
    Add to Cart The item has been added

    Information Security Practice and Experience

    The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11-14, 2005, in Singapore. As applications of information security technologies become pervasive, - sues pertaining to their...
    $122.00

    Add to Cart The item has been added
  • Operational Semantics for Timed Systems Operational Semantics for Timed Systems
    Add to Cart The item has been added

    Operational Semantics for Timed Systems

    This monograph is dedicated to a novel approach for uniform modelling of timed and hybrid systems. Heinrich Rust presents a time model which allows for both the description of discrete time steps and continuous processes with a...
    $92.00

    Add to Cart The item has been added
  • Security in Pervasive Computing Security in Pervasive Computing
    Add to Cart The item has been added

    Security in Pervasive Computing

    This volume contains the papers presented at the 2nd International Conference on Se- rityinPervasiveComputing(SPC2005)heldApril6-8,2005inBoppard,Germany.The objective of this second conference was to develop new security...
    $122.00

    Add to Cart The item has been added
  • Grid Computing in Life Science Grid Computing in Life Science
    Add to Cart The item has been added

    Grid Computing in Life Science

    Researchers in the ?eld of life sciences rely increasingly on information te- nology to extract and manage relevant knowledge. The complex computational and data management needs of life science research make Grid technologies...
    $122.00

    Add to Cart The item has been added
  • Embedded Systems Design Embedded Systems Design
    Add to Cart The item has been added

    Embedded Systems Design

    Embedded systems now include a very large proportion of the advanced products designed in the world, spanning transport (avionics, space, automotive, trains), electrical and electronic appliances (cameras, toys, televisions,...
    $184.00

    Add to Cart The item has been added
  • Information Networking Information Networking
    Add to Cart The item has been added

    Information Networking

    Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, Korea during January 31- February2,2005.ICOIN2005followedthesuccessofpreviousconferences.Since 1986,...
    $327.00

    Add to Cart The item has been added
  • Topics in Cryptology -- CT-RSA 2005 Topics in Cryptology -- CT-RSA 2005
    Add to Cart The item has been added

    Topics in Cryptology -- CT-RSA 2005

    The RSA Conferenceis attended by over10,000securityprofessionalseach year. The Cryptographers' Track (CT-RSA), one of several parallel tracks at the c- ference, provides an excellent opportunity for cryptographers to showcase...
    $122.00

    Add to Cart The item has been added
  • Peer-to-Peer Systems III Peer-to-Peer Systems III
    Add to Cart The item has been added

    Peer-to-Peer Systems III

    On February 26-27, 2004, the 3rd International Workshop on Peer-to-Peer S- tems (IPTPS 2004) brought researchers and practitioners together to discuss the latest developments in peer-to-peer technologies, applications, and...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2004 Advances in Cryptology - ASIACRYPT 2004
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2004

    The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5-9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean...
    $92.00

    Add to Cart The item has been added
  • Security in Communication Networks Security in Communication Networks
    Add to Cart The item has been added

    Security in Communication Networks

    The 4th International Conference on Security in Communication Networks 2004 (SCN2004)washeldatthe"DioceseHall"oftheArchdioceseofAmal?-Cavade' Tirreni and the "Armorial Bearings Hall" of the Archbishop Palace in Amal?, Italy, on...
    $116.00

    Add to Cart The item has been added
  • Global Computing Global Computing
    Add to Cart The item has been added

    Global Computing

    This volume collects revised versions of some of the papers presented at the S- ond IST/FET International Workshop on Global Computing held in Rovereto, Italy (9-12 March, 2004). The workshop involved all the thirteen projects...
    $122.00

    Add to Cart The item has been added
  • Distributed Computing -- IWDC 2004 Distributed Computing -- IWDC 2004
    Add to Cart The item has been added

    Distributed Computing -- IWDC 2004

    Last, but not least, thanks to all the participants and authors. We hope that they enjoyed the workshop as much as the wonderful and culturally vibrant city of Kolkata! Bhabani P. Sinha Indian Statistical Institute, Kolkata,...
    $122.00

    Add to Cart The item has been added
  • Power-Aware Computer Systems Power-Aware Computer Systems
    Add to Cart The item has been added

    Power-Aware Computer Systems

    Welcome to the proceedings of the 3rd Power-Aware Computer Systems (PACS 2003) Workshop held in conjunction with the 36th Annual International Symposium on Microarchitecture (MICRO-36). The increase in power and - ergy...
    $116.00

    Add to Cart The item has been added
  • Information and Communications Security Information and Communications Security
    Add to Cart The item has been added

    Information and Communications Security

    This volume contains the proceedings of the 6th International Conference on Infor- tionandCommunicationsSecurity(ICICS2004),Torremolinos(Malaga), ´ Spain,27-29 October 2004. The ?ve previous conferences were held in Beijing,...
    $184.00

    Add to Cart The item has been added
  • Network and Parallel Computing Network and Parallel Computing
    Add to Cart The item has been added

    Network and Parallel Computing

    This proceedings contains the papers presented at the 2004 IFIP International Conference on Network and Parallel Computing (NPC 2004), held at Wuhan, China, from October 18 to 20, 2004. The goal of the conference was to...
    $184.00

    Add to Cart The item has been added
  • Architecting Dependable Systems II Architecting Dependable Systems II
    Add to Cart The item has been added

    Architecting Dependable Systems II

    As software systems become ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be taken into account from the very beginning of the design process, it is appropriate...
    $92.00

    Add to Cart The item has been added
  • Software Security - Theories and Systems Software Security - Theories and Systems
    Add to Cart The item has been added

    Software Security - Theories and Systems

    Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4-6, 2003...
    $122.00

    Add to Cart The item has been added
  • Utility Computing Utility Computing
    Add to Cart The item has been added

    Utility Computing

    This volume of the Lecture Notes in Computer Science series contains all the papersacceptedforpresentationatthe13thIFIP/IEEEInternationalWorkshop on Distributed Systems: Operations and Management (DSOM 2004), which was held at...
    $92.00

    Add to Cart The item has been added
  • Recent Advances in Intrusion Detection Recent Advances in Intrusion Detection
    Add to Cart The item has been added

    Recent Advances in Intrusion Detection

    On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 7th Symposium on Recent Advances in Intrusion Detection (RAID 2004), which took place in Sophia-Antipolis, French Riviera, France,...
    $116.00

    Add to Cart The item has been added
  • Software and Compilers for Embedded Systems Software and Compilers for Embedded Systems
    Add to Cart The item has been added

    Software and Compilers for Embedded Systems

    This volume contains the proceedings of the 8th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2004) held in A- terdam, The Netherlands, on September 2 and 3, 2004. Initially, the workshop was...
    $122.00

    Add to Cart The item has been added
  • Advances in Computer Systems Architecture Advances in Computer Systems Architecture
    Add to Cart The item has been added

    Advances in Computer Systems Architecture

    On behalf of the program committee, we were pleased to present this year's program for ACSAC: Asia-Paci?c Computer Systems Architecture Conference. Now in its ninth year, ACSAC continues to provide an excellent forum for...
    $227.00

    Add to Cart The item has been added
  • Computer Security - ESORICS 2004 Computer Security - ESORICS 2004
    Add to Cart The item has been added

    Computer Security - ESORICS 2004

    ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13-15, 2004 in Sophia Antipolis, France...
    $116.00

    Add to Cart The item has been added
  • Secure Data Management Secure Data Management
    Add to Cart The item has been added

    Secure Data Management

    Concepts like ubiquitous computing and ambient intelligence that exploit - creasingly interconnected networks and mobility put new requirements on data management. An important element in the connected world is that data will...
    $122.00

    Add to Cart The item has been added
  • Trust and Privacy in Digital Business Trust and Privacy in Digital Business
    Add to Cart The item has been added

    Trust and Privacy in Digital Business

    Sincerely welcome to proceedings of the 1st International Conference on Trust and Privacy in Digital Business, Zaragoza, Spain, held from August 30th to September 1st, 2004. This conference was an outgrowth of the two ...
    $116.00

    Add to Cart The item has been added
  • Financial Cryptography Financial Cryptography
    Add to Cart The item has been added

    Financial Cryptography

    The8thAnnualFinancialCryptographyConferencewasheldduring9-12Feb- ary 2004 in Key West, Florida, USA. The conference was organized by the - ternational Financial Cryptography Association (IFCA). The program committee, which...
    $116.00

    Add to Cart The item has been added
  • Grid and Cooperative Computing Grid and Cooperative Computing
    Add to Cart The item has been added

    Grid and Cooperative Computing

    Grid and cooperative computing has emerged as a new frontier of information tech- logy. It aims to share and coordinate distributed and heterogeneous network resources ...
    $309.00

    Add to Cart The item has been added
  • Organic and Pervasive Computing -- ARCS 2004 Organic and Pervasive Computing -- ARCS 2004
    Add to Cart The item has been added

    Organic and Pervasive Computing -- ARCS 2004

    Where is system architecture heading? The special interest group on Computer and Systems Architecture (Fachausschuss Rechner- und Systemarchitektur) of the German computer and information technology associations GI and ITG a-...
    $122.00

    Add to Cart The item has been added
  • Information Security and Cryptology - ICISC 2003 Information Security and Cryptology - ICISC 2003
    Add to Cart The item has been added

    Information Security and Cryptology - ICISC 2003

    This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers...
    $122.00

    Add to Cart The item has been added
  • Active Networks Active Networks
    Add to Cart The item has been added

    Active Networks

    This volume of the LNCS series contains the proceedings of the 5th Internat- nal Working Conference on Active Networks (IWAN 2003) held in the ancient cultural city of Kyoto, Japan. This year we received 73 submissions. The...
    $92.00

    Add to Cart The item has been added
  • Digital Watermarking Digital Watermarking
    Add to Cart The item has been added

    Digital Watermarking

    We are happy to present to you the proceedings of the 2nd International Workshop on Digital Watermarking, IWDW 2003. Since its modern re-appearance in the academic community in the early 1990s, great progress has been made in...
    $227.00

    Add to Cart The item has been added
  • Topics in Cryptology -- CT-RSA 2004 Topics in Cryptology -- CT-RSA 2004
    Add to Cart The item has been added

    Topics in Cryptology -- CT-RSA 2004

    The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an...
    $92.00

    Add to Cart The item has been added
  • Progress in Cryptology -- INDOCRYPT 2003 Progress in Cryptology -- INDOCRYPT 2003
    Add to Cart The item has been added

    Progress in Cryptology -- INDOCRYPT 2003

    TheINDOCRYPTconferenceseriesstartedin2000,andINDOCRYPT2003was the fourth one in this series. This series has been accepted by the international research community as a forum for presenting high-quality crypto research, as is...
    $92.00

    Add to Cart The item has been added
  • Advances in Cryptology - ASIACRYPT 2003 Advances in Cryptology - ASIACRYPT 2003
    Add to Cart The item has been added

    Advances in Cryptology - ASIACRYPT 2003

    ASIACRYPT 2003 was held in Taipei, Taiwan, from Nov. 30 to Dec. 4, 2003. The 9th Annual ASIACRYPT conference was sponsored by the International Association for Cryptologic Research (IACR), this year in cooperation with the...
    $92.00

    Add to Cart The item has been added
  • Job Scheduling Strategies for Parallel Processing Job Scheduling Strategies for Parallel Processing
    Add to Cart The item has been added

    Job Scheduling Strategies for Parallel Processing

    This volume contains the papers presented at the 9th workshopon Job Sched- ing Strategies for Parallel Processing, which was held in conjunction with HPDC12 and GGF8 in Seattle, Washington, on June 24, 2003. The papers went...
    $122.00

    Add to Cart The item has been added
  • Privacy Enhancing Technologies Privacy Enhancing Technologies
    Add to Cart The item has been added

    Privacy Enhancing Technologies

    PET 2003 was the 3rd Workshop on Privacy Enhancing Technologies. It all startedin2000withHannesFederrathorganizing"DesigningPrivacyEnhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability," July 25-26,...
    $92.00

    Add to Cart The item has been added
  • Ad-Hoc, Mobile, and Wireless Networks Ad-Hoc, Mobile, and Wireless Networks
    Add to Cart The item has been added

    Ad-Hoc, Mobile, and Wireless Networks

    AdHoc Networks are wireless, self-organizing systems formed by co-operating nodes, within communication range of each other which form temporary n- works. Their topology is dynamic, decentralized, and ever-changing, and the...
    $116.00

    Add to Cart The item has been added
Operating systems