OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 500 from your keywords: subject="DATA"
First Page Previous 46 47 48 49 50 Last Page
cover
Enterprise Information Management in Practice Managing Data and Leveraging P…
Comment Share
CHAKI, Saumya

Learn how to form and execute an enterprise information strategy: topics include data governance strategy, data architecture strategy, information security strategy, big data strategy, and cloud strategy. Manage information like a pro, to achieve much better financial results for the enterprise, more efficient processes, and multiple advantages over competitors. As you’ll discover in Enter…

Edition
-
ISBN/ISSN
978-1-4842-1218-9
Collation
76 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Enterprise Cybersecurity How to Build a Successful Cyberdefense Program Agai…
Comment Share
DONALDSON, Scott E.SIEGEL, Stanley G.WILLIAMS, Chris K.ASLAM, Abdul

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, design, implement, and operate a coherent cybersecurity pro…

Edition
-
ISBN/ISSN
978-1-4302-6083-7
Collation
223 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Timing Channels in Cryptography
Comment Share
REBEIRO, ChesterMUKHOPADHYAY, DebdeepBHATTACHARYA, Sarani

This book deals with timing attacks on cryptographic ciphers. It describes and analyzes various unintended covert timing channels that are formed when ciphers are executed in microprocessors. The book considers modern superscalar microprocessors which are enabled with features such as multi-threaded, pipelined, parallel, speculative, and out-of order execution. Various timing attack algorithms …

Edition
-
ISBN/ISSN
978-3-319-12370-7
Collation
61 b/w illustrations, 14 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Computational Intelligence in Data Mining -
Comment Share
Lakhmi C. Jain dkk

The contributed volume aims to explicate and address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. Data Mining aims at the automatic discovery of underlying non-trivial knowledge from datasets by applying intelligent analysis techniques. The interest in this research area has experience…

Edition
Volume 3
ISBN/ISSN
9788132222026
Collation
XXVIII, 717 p. 254 illus.
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Engineering Applications of Neural Networks 16th International Conference, E…
Comment Share
ILIADIS, LazarosJAYNE, Chrisina

This book constitutes the refereed proceedings of the 16th International Conference on Engineering Applications of Neural Networks, EANN 2015, held in Rhodes, Greece, in September 2015. The 36 revised full papers presented together with the abstracts of three invited talks and two tutorials were carefully reviewed and selected from 84 submissions. The papers are organized in topical sections…

Edition
-
ISBN/ISSN
978-3-319-23983-5
Collation
130 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Energy Time Series Forecasting Efficient and Accurate Forecasting of Evolvin…
Comment Share
DANNECKER, Lars

Lars Dannecker developed a novel online forecasting process that significantly improves how forecasts are calculated. It increases forecasting efficiency and accuracy, as well as allowing the process to adapt to different situations and applications. Improving the forecasting efficiency is a key pre-requisite for ensuring stable electricity grids in the face of an increasing amount of renewable…

Edition
-
ISBN/ISSN
978-3-658-11039-0
Collation
73 b/w illustrations, 19 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Energy Minimization Methods in Computer Vision and Pattern Recognition 10th …
Comment Share
TAI, Xue-ChengBAE, EgilCHAN, Tony F.LYSAKER, Marius

This volume constitutes the refereed proceedings of the 10th International Conference on Energy Minimization Methods in Computer Vision and Pattern Recognition, EMMCVPR 2015, held in Hong Kong, China, in January 2015. The 36 revised full papers were carefully reviewed and selected from 45 submissions. The papers are organized in topical sections on discrete and continuous optimization; image re…

Edition
-
ISBN/ISSN
978-3-319-14612-6
Collation
179 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Energy Efficient Data Centers Third International Workshop, E2DC 2014, Cambr…
Comment Share
KLINGERT, SonjaCHINNIICI, MartaPORTO, Milagros Rey

This book constitutes the thoroughly refereed post-conference proceedings of the Third International Workshop on Energy Efficient Data Centers, E2DC 2014, held in Cambridge, UK, in June 2014. The 10 revised full papers presented were carefully selected from numerous submissions. They are organized in three topical sections named: energy optimization algorithms and models, the future role of dat…

Edition
-
ISBN/ISSN
978-3-319-15786-3
Collation
85 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Theory of Cryptography
Comment Share
DODIS, YevgeniyNIELSEN, Jesper Buus

The two-volume set LNCS 9014 and LNCS 9015 constitutes the refereed proceedings of the 12th International Conference on Theory of Cryptography, TCC 2015, held in Warsaw, Poland in March 2015. The 52 revised full papers presented were carefully reviewed and selected from 137 submissions. The papers are organized in topical sections on foundations, symmetric key, multiparty computation, concu…

Edition
-
ISBN/ISSN
978-3-662-46494-6
Collation
89 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Network and System Security
Comment Share
QIU, MeikangXU, ShouhuaiYUNG, MotiZHANG, Haibo

This book constitutes the proceedings of the 9th International Conference on Network and System Security, NSS 2015, held in New York City, NY, USA, in November 2015. The 23 full papers and 18 short papers presented were carefully reviewed and selected from 110 submissions. The papers are organized in topical sections on wireless security and privacy; smartphone security; systems security; appl…

Edition
1
ISBN/ISSN
978-3-319-25644-3
Collation
XIV, 542
Series Title
Lecture Notes in Computer Science
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 46 47 48 49 50 Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?