This book mainly focuses on cloud security and high performance computing for cloud auditing. The...
Network monitoring serves as the basis for a wide scope of network, engineering and management op...
This book introduces fundamentals and trade-offs of data de-duplication techniques. It describes ...
This book constitutes the refereed post-conference proceedings of the 6th IFIP International Cros...
This book constitutes the refereed post-conference proceedings of the 6th IFIP International Cros...
Network monitoring serves as the basis for a wide scope of network, engineering and management op...
This book introduces fundamentals and trade-offs of data de-duplication techniques. It describes ...
This book constitutes the refereed post-conference proceedings of the 6th IFIP International Cros...
This book mainly focuses on cloud security and high performance computing for cloud auditing. The...
This book constitutes the refereed post-conference proceedings of the 6th IFIP International Cros...