Showing 1 - 2 of 2
1. Attacks on IT systems: categories of motives / Georg Disterer -- 2. Wireless security / Faisal Kaleem and Kang K. Yen -- 3. Analysis, development and deployment of statistical anomaly detection techniques for real e-mail traffic / Gianluca Papaleo ... [et al.] -- 4. Forensics challenges for...
Persistent link: https://www.econbiz.de/10011727254
This book addresses flexibility of both business and information systems through component technology at the nexus of three seemingly unrelated disciplines: service-oriented architecture, knowledge management, and business process management. It presents research on agile, adaptive processes and...
Persistent link: https://www.econbiz.de/10011726376