Verlag: Aspen Publishers Inc.,U.S. 20/12/1995, 1995
ISBN 10: 0834207303 ISBN 13: 9780834207301
Sprache: Englisch
Anbieter: AwesomeBooks, Wallingford, Vereinigtes Königreich
EUR 5,66
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: Very Good. This book is in very good condition and will be shipped within 24 hours of ordering. The cover may have some limited signs of wear but the pages are clean, intact and the spine remains undamaged. This book has clearly been well maintained and looked after thus far. Money back guarantee if you are not satisfied. See all our books here, order more than 1 book and get discounted shipping. .
EUR 18,36
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbZustand: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
ISBN 10: 3131144025 ISBN 13: 9783131144027
Sprache: Deutsch
Anbieter: medimops, Berlin, Deutschland
EUR 18,36
Währung umrechnenAnzahl: 7 verfügbar
In den WarenkorbZustand: good. Befriedigend/Good: Durchschnittlich erhaltenes Buch bzw. Schutzumschlag mit Gebrauchsspuren, aber vollständigen Seiten. / Describes the average WORN book or dust jacket that has all the pages present.
Anbieter: Buchpark, Trebbin, Deutschland
EUR 44,51
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Sehr gut. Zustand: Sehr gut | Seiten: 660 | Sprache: Englisch | Produktart: Bücher.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 118,64
Gebraucht ab EUR 44,51
Mehr entdecken Softcover
Verlag: Springer International Publishing, 2016
ISBN 10: 3031010353 ISBN 13: 9783031010354
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 48,14
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book covers the topic of temporal tagging, the detection of temporal expressions and the normalization of their semantics to some standard format. It places a special focus on the challenges and opportunities of domain-sensitive temporal tagging. After providing background knowledge on the concept of time, the book continues with a comprehensive survey of current research on temporal tagging. The authors provide an overview of existing techniques and tools, and highlight key issues that need to be addressed. This book is a valuable resource for researchers and application developers who need to become familiar with the topic and want to know the recent trends, current tools and techniques, as well as different application domains in which temporal information is of utmost importance. Due to the prevalence of temporal expressions in diverse types of documents and the importance of temporal information in any information space, temporal tagging is an important task in natural language processing (NLP), and applications of several domains can benefit from the output of temporal taggers to provide more meaningful and useful results. In recent years, temporal tagging has been an active field in NLP and computational linguistics. Several approaches to temporal tagging have been proposed, annotation standards have been developed, gold standard data sets have been created, and research competitions have been organized. Furthermore, some temporal taggers have also been made publicly available so that temporal tagging output is not just exploited in research, but is finding its way into real world applications. In addition, this book particularly focuses on domain-specific temporal tagging of documents. This is a crucial aspect as different types of documents (e.g., news articles, narratives, and colloquial texts) result in diverse challenges for temporal taggers and should be processed in a domain-sensitive manner.
Verlag: Springer International Publishing, Springer International Publishing, 2017
ISBN 10: 3319643665 ISBN 13: 9783319643663
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 15th International Symposium on Spatial and Temporal Databases, SSTD 2017, held in Arlington, VA, USA, in August 2017.The 19 full papers presented together with 8 demo papers and 5 vision papers were carefully reviewed and selected from 90 submissions. The papers are organized around the current research on concepts, tools, and techniques related to spatial and temporal databases.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 55,76
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 55,76
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: WeBuyBooks, Rossendale, LANCS, Vereinigtes Königreich
EUR 66,07
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned. Ex library copy with usual stamps & stickers.
Mehr Angebote von anderen Verkäufern bei ZVAB
Neu ab EUR 114,36
Gebraucht ab EUR 72,75
Mehr entdecken Hardcover
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 72,92
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 272 pages. 9.00x6.00x0.75 inches. In Stock.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 109,94
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Integrity and Internal Control in Information Systems V represents a continuation of the dialogue between researchers, information security specialists, internal control specialists and the business community. The objectives of this dialogue are: -To present methods and techniques that will help business achieve the desired level of integrity in information systems and data; -To present the results of research that may be used in the near future to increase the level of integrity or help management maintain the desired level of integrity; -To investigate the shortcomings in the technologies presently in use, shortcomings that require attention in order to protect the integrity of systems in general. The book contains a collection of papers from the Fifth International Working Conference on Integrity and Internal Control in Information Systems (IICIS), sponsored by the International Federation for Information Processing (IFIP) and held in Bonn, Germany in November 2002.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 112,77
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: - what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; - what is the status quo of research and development in this area; - where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: - Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. - Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. - Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 114,36
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - IT Governance is finally getting the Board's and top management's attention. The value that IT needs to return and the associated risks that need to be managed, have become so important in many industries that enterprise survival depends on it. Information integrity is a significant part of the IT Governance challenge. Among other things, this conference will explore how Information Integrity contributes to the overall control and governance frameworks that enterprises need to put in place for IT to deliver business value and for corporate officers to be comfortable about the IT risks the enterprise faces. The goals for this international working conference are to find answers to the following questions: - what precisely do business managers need in order to have confidence in the integrity of their information systems and their data; - what is the status quo of research and development in this area; - where are the gaps between business needs on the one hand and research I development on the other; what needs to be done to bridge these gaps. The contributions have been divided in the following sections: - Refereed papers. These are papers that have been selected through a blind refereeing process by an international programme committee. - Invited papers. Well known experts present practice and research papers upon invitation by the programme committee. - Tutorial. Two papers describe the background, status quo and future development of CobiT as well as a case of an implementation of Co biT.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 122,12
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today's often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public's trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.
Verlag: Springer US, Springer New York, 2007
ISBN 10: 0387485325 ISBN 13: 9780387485324
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 166,41
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Motivation for the book Database security has been gaining a great deal of importance as industry, military, and government organizations have increasingly adopted Internet-based techno- gies on a large-scale, because of convenience, ease of use, and the ability to take advantage of rapid advances in the commercial market. Along with the traditional security aspects of data integrity and availability, there is an increasing interest in research and development in data privacy. This is because today's often missi- critical databases no longer contain only data used for day-to-day processing by organization; as new applications are being added, it is possible for organizations to collect and store vast amounts of data quickly and ef ciently and to make the data readily accessible to the public, typically through Web-based applications. Unfor- nately, if security threats related to the integrity, availability, and privacy of the data are not properly resolved, databases remain vulnerable to malicious attacks and - cidental misuse. Such incidents, in turn, may translate into nancial losses or losses whose values are obviously high but dif cult to quantify, e. g. , the loss of the public's trust in the data management infrastructure and services offered by an organization. In assembling this handbook, we have had a twofold objective: rst, to provide a comprehensive summary of the results of research and development activities in various aspects of database security up to this point, and second, to point toward directions for future work in this important and fruitful eld of research.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 250,21
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 288 pages. 9.75x6.25x0.75 inches. In Stock.