9788132226512-8132226518-Advanced Computing and Systems for Security: Volume 2 (Advances in Intelligent Systems and Computing, 396)

Advanced Computing and Systems for Security: Volume 2 (Advances in Intelligent Systems and Computing, 396)

ISBN-13: 9788132226512
ISBN-10: 8132226518
Edition: 1st ed. 2016
Author: Khalid Saeed, Nabendu Chaki, Rituparna Chaki, Agostino Cortesi
Publication date: 2015
Publisher: Springer
Format: Paperback 334 pages
FREE US shipping
Buy

From $38.70

Book details

ISBN-13: 9788132226512
ISBN-10: 8132226518
Edition: 1st ed. 2016
Author: Khalid Saeed, Nabendu Chaki, Rituparna Chaki, Agostino Cortesi
Publication date: 2015
Publisher: Springer
Format: Paperback 334 pages

Summary

Advanced Computing and Systems for Security: Volume 2 (Advances in Intelligent Systems and Computing, 396) (ISBN-13: 9788132226512 and ISBN-10: 8132226518), written by authors Khalid Saeed, Nabendu Chaki, Rituparna Chaki, Agostino Cortesi, was published by Springer in 2015. With an overall rating of 3.9 stars, it's a notable title among other AI & Machine Learning (Data Processing, Databases & Big Data, Network Security, Security & Encryption, Cloud Computing, Networking & Cloud Computing, Computer Science) books. You can easily purchase or rent Advanced Computing and Systems for Security: Volume 2 (Advances in Intelligent Systems and Computing, 396) (Paperback) from BooksRun, along with many other new and used AI & Machine Learning books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book