The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connecte…
This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidential…
This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015. The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigati…
This book is one of the first comprehensive works to fill the knowledge gap resulting from the limited number of empirical studies on interfirm networks. The in-depth empirical research presented here is based on a massive transaction relationship database of approximately 400,000 Japanese firms. This volume, unlike others, focuses on the role of interfirm networks in three different fields: (1…
This book is one of the first comprehensive works to fill the knowledge gap resulting from the limited number of empirical studies on interfirm networks. The in-depth empirical research presented here is based on a massive transaction relationship database of approximately 400,000 Japanese firms. This volume, unlike others, focuses on the role of interfirm networks in three different fields: (1…
This book presents a systematic overview of cutting-edge research in the field of parametric modeling of personal income and wealth distribution, which allows one to represent how income/wealth is distributed within a given population. The estimated parameters may be used to gain insights into the causes of the evolution of income/wealth distribution over time, or to interpret the differences b…
The Definitive Guide to MongoDB, Third Edition, is updated for MongoDB 3 and includes all of the latest MongoDB features, including the aggregation framework introduced in version 2.2 and hashed indexes in version 2.4. The Third Edition also now includes Python. MongoDB is the most popular of the "Big Data" NoSQL database technologies, and it's still growing. David Hows from 10gen, along wit…
This book explains how major world economies are recognizing the need for a major push in cyber policy environments. It helps readers understand why these nations are committing substantial resources to cybersecurity, and to the development of standards, rules and guidelines in order to address cyber-threats and catch up with global trends and technological developments. A key focus is on speci…
This book constitutes the refereed conference proceedings of the 20th Australasian Conference on Information Security and Privacy, ACISP 2015, held in Brisbane, QLD, Australia, in June/July 2015. The 28 revised full papers presented in this volume were carefully revised and selected from 112 submissions. The papers are organized in topical sections on symmetric cryptanalysis; public key cryp…
Tujuan dari buku ini ada dua: untuk membantu para pembaca yang masih awam dalam penelitian politik untuk mempelajari dasar-dasar cara menggunakan R dan untuk memberikan rincian kepada para pengguna R tingkat menengah mengenai teknik-teknik yang mungkin belum pernah mereka gunakan sebelumnya. R telah menjadi terkenal dalam penelitian politik karena gratis, mudah untuk menggabungkan paket-paket y…