agt approaches in integrative introduction to public key ... · fundamentals of parameterized...

8
News 10/2013 Computer Science 55 A. Bassi, Alessandro Bassi Consulting, Nice, France; M. Bauer, NEC Europe Ltd. NEC House 1, London, UK; M. Fiedler, Fraunhofer Gesellschaft IML, Dortmund, Germany; T. Kramp, IBM Research, Rüschlikon, Switzerland; R. v. Kranenburg, Internet of People Ltd., London, UK; S. Lange, Deloitte&Touche GmbH, Berlin, Germany; S. Meissner, University of Surrey Fac. Engineering & Physical Sciences, Guildford, UK (Eds) Enabling Things to Talk Designing IoT solutions with the IoT Architectural Reference Model Features 7 First comprehensive overview of the European Architecture Reference Model (ARM) for the Internet of ings 7 Includes both a reference manual and numerous best practices and tips for implementing the ARM 7 Illustrates ARM implementations on the basis of several industrial case studies 7 Written in cooperation by leading soſtware and solution providers (Alcatel-Lucent, IBM , Ericsson, NEC, NXP, SAP, Siemens) and top-level research institutions Contents Introduction to the Internet of ings.- e Need for a Common Ground for the IoT — e History and Reasoning Behind the IoT — A Project.- e IoT Architectural Reference Model as Enabler.- IoT in Practice: Examples — IoT in Logistics and Health.- IoT — A Guidance to the ARM.- A Process to Generate Concrete Architectures.- IoT Reference Model.- IoT Reference Architecture.- e IoT ARM Reference Manual.- Interactions.- Toward a Concrete Architecture.- ARM Testimo- nials.- Summary and Outlook. Fields of interest Information Systems Applications (incl.Internet); Business Information Systems; Computer Appl. in Administrative Data Processing Target groups Professional/practitioner Product category Monograph Due October 2013 2013. X, 274 p. 131 illus., 116 in color. Hardcover 7 * € (D) 53,49 | € (A) 54,99 | sFr 67,00 7 € 49,99 | £44.99 ISBN 978-3-642-40402-3 9<HTOGPC=eaeacd> J. A. Buchmann, TU Darmstadt, Darmstadt, Germany; E. Karatsiolis, FlexSecure GmbH, Darmstadt, Germany; A. Wiesmaier, AGT International, Darmstadt, Germany Introduction to Public Key Infrastructures e introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating soſtware downloads and updates. Features 7 Explains the most important concepts, stan- dards, implementations, and applications 7 All chapters contain exercises, solutions provided in an appendix 7 Suitable for advanced under- graduate and graduate university courses and for self-study by researchers and practitioners Contents Chap. 1 e Purpose of PKI.- Chap. 2 Certifi- cates.- Chap. 3 Trust Models.- Chap. 4 Private Keys.- Chap. 5 Revocation.- Chap. 6 Validity Models.- Chap. 7 Certification Service Provider.- Chap. 8 Certificate Policies.- Chap. 9 Certification Paths: Retrieval and Validation.- Chap. 10 PKI in Practice.- App. A A Basic Path Validation Algo- rithm.- App. B Exercise Solutions.- Index. Fields of interest Data Structures, Cryptology and Information e- ory; Systems and Data Security; e-Commerce/e- business Target groups Upper undergraduate Product category Graduate/Advanced undergraduate textbook Due November 2013 2013. VIII, 214 p. Hardcover 7 * € (D) 53,49 | € (A) 54,99 | sFr 67,00 7 € 49,99 | £44.99 ISBN 978-3-642-40656-0 9<HTOGPC=eagfga> M. Chen, Zhejiang University, Hangzhou, People‘s Republic of China; R. Hofestädt, Bielefeld University, Bielefeld, Germany (Eds) Approaches in Integrative Bioinformatics Towards the Virtual Cell „Approaches in Integrative Bioinformatics: To- wards the Virtual Cell“ provides a basic introduc- tion to biological information systems, as well as guidance for the computational analysis of systems biology. is book also covers a range of issues and methods that reveal the multitude of omics data integration types and the relevance that in- tegrative bioinformatics has today. Topics include biological data integration and manipulation, modeling and simulation of metabolic networks, transcriptomics and phenomics, and virtual cell approaches, as well as a number of applications of network biology. It helps to illustrate the value of integrative bioinformatics approaches to the life sciences. is book is intended for researchers and graduate students in the field of Bioinformat- ics. Professor Ming Chen is the Director of the Bioinformatics Laboratory at the College of Life Sciences, Zhejiang University, Hangzhou, China. Features 7 Presents a summary of essential topics, basic introductions and latest developments in integra- tive bioinformatics 7 Introduces a key point to understand the mechanism of life, i.e. the systems biology towards the virtual cell study 7 Contrib- uted by many distinguished experts worldwide Contents Part I: Introduction.- Part II: Information Fusion and Retrieval.- Part III: Network Visualization, Modeling and Analysis.- Part IV: BioData Map- ping.- Part V: Biocompution. Fields of interest Computational Biology/Bioinformatics; Bioinfor- matics; Biological Networks, Systems Biology Target groups Research Product category Contributed volume Due November 2013 2013. 340 p. 103 illus., 78 in color. With online files/ update. Hardcover 7 * € (D) 101,64 | € (A) 104,49 | sFr 126,50 7 € 94,99 | £85.50 ISBN 978-3-642-41280-6 9<HTOGPC=ebciag>

Upload: others

Post on 22-May-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

News 10/2013 Computer Science

55

A. Bassi, Alessandro Bassi Consulting, Nice, France; M. Bauer, NEC Europe Ltd. NEC House 1, London, UK; M. Fiedler, Fraunhofer Gesellschaft IML, Dortmund, Germany; T. Kramp, IBM Research, Rüschlikon, Switzerland; R. v. Kranenburg, Internet of People Ltd., London, UK; S. Lange, Deloitte&Touche GmbH, Berlin, Germany; S. Meissner, University of Surrey Fac. Engineering & Physical Sciences, Guildford, UK (Eds)

Enabling Things to TalkDesigning IoT solutions with the IoT Architectural Reference Model

Features 7 First comprehensive overview of the European Architecture Reference Model (ARM) for the Internet of Things 7 Includes both a reference manual and numerous best practices and tips for implementing the ARM 7 Illustrates ARM implementations on the basis of several industrial case studies 7 Written in cooperation by leading software and solution providers (Alcatel-Lucent, IBM , Ericsson, NEC, NXP, SAP, Siemens) and top-level research institutions

Contents Introduction to the Internet of Things.- The Need for a Common Ground for the IoT — The History and Reasoning Behind the IoT — A Project.- The IoT Architectural Reference Model as Enabler.- IoT in Practice: Examples — IoT in Logistics and Health.- IoT — A Guidance to the ARM.- A Process to Generate Concrete Architectures.- IoT Reference Model.- IoT Reference Architecture.- The IoT ARM Reference Manual.- Interactions.- Toward a Concrete Architecture.- ARM Testimo-nials.- Summary and Outlook.

Fields of interestInformation Systems Applications (incl.Internet); Business Information Systems; Computer Appl. in Administrative Data Processing

Target groupsProfessional/practitioner

Product categoryMonograph

Due October 2013

2013. X, 274 p. 131 illus., 116 in color. Hardcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-642-40402-3

9<HTOGPC=eaeacd>

J. A. Buchmann, TU Darmstadt, Darmstadt, Germany; E. Karatsiolis, FlexSecure GmbH, Darmstadt, Germany; A. Wiesmaier, AGT International, Darmstadt, Germany

Introduction to Public Key InfrastructuresThe introduction of public key cryptography (PKC) was a critical advance in IT security. In contrast to symmetric key cryptography, it enables confidential communication between entities in open networks, in particular the Internet, without prior contact. Beyond this PKC also enables protection techniques that have no analogue in traditional cryptography, most importantly digital signatures which for example support Internet security by authenticating software downloads and updates.

Features 7 Explains the most important concepts, stan-dards, implementations, and applications 7 All chapters contain exercises, solutions provided in an appendix 7 Suitable for advanced under-graduate and graduate university courses and for self-study by researchers and practitioners

Contents Chap. 1 The Purpose of PKI.- Chap. 2 Certifi-cates.- Chap. 3 Trust Models.- Chap. 4 Private Keys.- Chap. 5 Revocation.- Chap. 6 Validity Models.- Chap. 7 Certification Service Provider.- Chap. 8 Certificate Policies.- Chap. 9 Certification Paths: Retrieval and Validation.- Chap. 10 PKI in Practice.- App. A A Basic Path Validation Algo-rithm.- App. B Exercise Solutions.- Index.

Fields of interestData Structures, Cryptology and Information The-ory; Systems and Data Security; e-Commerce/e-business

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due November 2013

2013. VIII, 214 p. Hardcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-642-40656-0

9<HTOGPC=eagfga>

M. Chen, Zhejiang University, Hangzhou, People‘s Republic of China; R. Hofestädt, Bielefeld University, Bielefeld, Germany (Eds)

Approaches in Integrative BioinformaticsTowards the Virtual Cell

„Approaches in Integrative Bioinformatics: To-wards the Virtual Cell“ provides a basic introduc-tion to biological information systems, as well as guidance for the computational analysis of systems biology. This book also covers a range of issues and methods that reveal the multitude of omics data integration types and the relevance that in-tegrative bioinformatics has today. Topics include biological data integration and manipulation, modeling and simulation of metabolic networks, transcriptomics and phenomics, and virtual cell approaches, as well as a number of applications of network biology. It helps to illustrate the value of integrative bioinformatics approaches to the life sciences. This book is intended for researchers and graduate students in the field of Bioinformat-ics. Professor Ming Chen is the Director of the Bioinformatics Laboratory at the College of Life Sciences, Zhejiang University, Hangzhou, China.

Features 7 Presents a summary of essential topics, basic introductions and latest developments in integra-tive bioinformatics 7 Introduces a key point to understand the mechanism of life, i.e. the systems biology towards the virtual cell study 7 Contrib-uted by many distinguished experts worldwide

Contents Part I: Introduction.- Part II: Information Fusion and Retrieval.- Part III: Network Visualization, Modeling and Analysis.- Part IV: BioData Map-ping.- Part V: Biocompution.

Fields of interestComputational Biology/Bioinformatics; Bioinfor-matics; Biological Networks, Systems Biology

Target groupsResearch

Product categoryContributed volume

Due November 2013

2013. 340 p. 103 illus., 78 in color. With online files/update. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-3-642-41280-6

9<HTOGPC=ebciag>

Page 2: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

Computer Science springer.com/NEWSonline

56

M. Cossentino, ICAR-CNR, Palermo, Italy; V. Hilaire, University of Technology of Belfort Montbéliard, Belfort cedex, France; A. Molesini, Università di Bologna, Bologna, Italy; V. Seidita, University of Palermo, Palermo, Italy (Eds)

Handbook on Agent-Oriented Design ProcessesTo deal with the flexible architectures and evolving functionalities of complex modern systems, the agent metaphor and agent-based computing are often the most appropriate software design ap-proach. As a result, a broad range of special-pur-pose design processes has been developed in the last several years to tackle the challenges of these specific application domains. In this context, in early 2012 the IEEE-FIPA Design Process Docu-mentation Template SC0097B was defined, which facilitates the representation of design processes and method fragments through the use of stan-dardized templates, thus supporting the creation of easily sharable repositories and facilitating the composition of new design processes. Following this standardization approach, this book gathers the documentations of some of the best-known agent-oriented design processes.

Features 7 First comprehensive overview of the 13 most important agent-oriented software design processes in a standardized format 7 Includes the widely known OpenUP design process, the de facto standard in object-oriented software engi-neering 7 Descriptions are based on the IEEE-FIPA Design Process Documentation Template SC0097B, which allows different design processes to be easily compared 7 Each design process is described by its original creators or well-known researchers in the field

Fields of interestSoftware Engineering; Artificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryHandbook

Due October 2013

2013. Approx. 550 p. Hardcover7 approx. * € (D) 106,99 | € (A) 109,99 | sFr 133,507 approx. € 99,99 | £90.00ISBN 978-3-642-39974-9

9<HTOGPC=djjhej>

R. G. Downey, Victoria University, Wellington, New Zealand; M. R. Fellows, Charles Darwin University, Darwin, NT, Australia

Fundamentals of Parameterized ComplexityContents Introduction.- Part I: Parameterized Tractabil-ity.- Preliminaries.- The Basic Definitions.- Part II: Elementary Positive Techniques.- Bounded Search Trees.- Kernelization.- More on Kernelization.- It-erative Compression, and Measure and Conquer, for Minimization Problems.- Further Elementary Techniques.- Colour Coding, Multilinear Detec-tion, and Randomized Divide and Conquer.- Op-timization Problems, Approximation Schemes, and Their Relation to FPT.- Part III: Techniques Based on Graph Structure.- Treewidth and Dy-namic Programming.- Heuristics for Treewidth.- Automata and Bounded Treewidth.- Courcelle‘s Theorem.- More on Width-Metrics: Applica-tions and Local Treewidth.- Depth-First Search and the Plehn-Voigt Theorem.- Other Width Metrics.- Part IV: Exotic Meta-Techniques.- Well-Quasi-Orderings and the Robertson-Seymour Theorems.- The Graph Minor Theorem.- Applica-tions of the Obstruction Principle and WQOs.- Part V: Hardness Theory.- Reductions.- The Basic Class W[1] and an Analog of Cook‘s Theorem.- Other Hardness Results.- The W-Hierarchy.- The Monotone and Antimonotone Collapses.- Beyond W-Hardness.- k-Move Games.- Provable Intracta-bility: The Class XP.- Another Basis.- Part VI: Ap-proximations, Connections, Lower Bounds.- The M-Hierarchy, and XP-optimality.- Kernelization Lower Bounds.- Part VII: Further Topics.- Param-eterized Approximation.- Parameterized Counting and Randomization.- Part VIII: Research Hori-zons.- Research Horizons.- Part IX Appendices. [...]

Fields of interestAlgorithm Analysis and Problem Complexity; Mathematics of Algorithmic Complexity

Target groupsUpper undergraduate

Product categoryGraduate/Advanced undergraduate textbook

Due November 2013

2014. XXXVI, 812 p. 81 illus. (Texts in Computer Science) Hardcover7 * € (D) 85,59 | € (A) 87,99 | sFr 106,507 € 79,99 | £72.00ISBN 978-1-4471-5558-4

9<HTMEPH=bfffie>

S. Du, H. Zhu, Shanghai Jiao Tong University, Shanghai, People‘s Republic of China

Security Assessment in Vehicular NetworksThis book presents several novel approaches to model the interaction between the attacker and the defender and assess the security of Vehicular Ad Hoc Networks (VANETs). The first security assessment approach is based on the attack tree security assessment model, which leverages tree based methods to analyze the risk of the system and identify the possible attacking strategies the adversaries may launch. To further capture the interaction between the attacker and the defender, the authors propose to utilize the attack-defense tree model to express the potential counter-measures which could mitigate the system. By considering rational participants that aim to maximize their payoff function, the brief describes a game-theoretic analysis approach to investigate the possible strategies that the security admin-istrator and the attacker could adopt. A phased attack-defense game allows the reader to model the interactions between the attacker and defender for VANET security assessment. The brief offers a variety of methods for assessing the security of wireless networks. Professionals and researchers working on the defense of VANETs will find this material valuable.

Contents Introduction to Vehicular Networks Security.- Se-curity Assessment via Attack Tree Model.- Attack-Defense Tree Based Security Assessment.- A VANETs Attack-Defense Game.- Modelling of Multiple Phased Attack on VANET Security.

Fields of interestComputer Communication Networks; Systems and Data Security; Communications Engineering, Networks

Target groupsResearch

Product categoryBrief

Due October 2013

2014. X, 55 p. 9 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-9356-3

9<HTMERB=ejdfgd>

Page 3: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

News 10/2013 Computer Science

57

D. R. Ferreira, Technical University of Lisbon, Porto Salvo, Portugal

Enterprise Systems IntegrationA Process-Oriented Approach

The field of enterprise systems integration is constantly evolving, as every new technology that is introduced appears to make all previous ones obsolete. Despite this continuous evolution, there is a set of underlying concepts and technologies that have been gaining an increasing importance in this field. Examples are asynchronous messag-ing through message queues, data and application adapters based on XML and Web services, the principles associated with the service-oriented architecture (SOA), service composition, orches-trations, and advanced mechanisms such as cor-relations and long-running transactions.

Features 7 Comprehensive step-by-step description of various integration levels 7 Clearly connects theoretical concepts with industry-leading prod-ucts and standards 7 Gradually and systemati-cally reveals “the big picture” of enterprise systems integration 7 Illustrates every step and layer with the help of implementation examples

Contents Part I Introduction.- Evolution of Enterprise Systems.- Introduction to BizTalk Server.- Part II Messaging.- Messaging Systems.- Message Brokers.- Part III Adapters.- Data Adapters.- Ap-plication Adapters.- Part IV Orchestrations.- Ser-vices and SOA.- Orchestration Flow.- Advanced Constructs.- Orchestrations with BPEL.- Part V Processes.- Process modeling with BPMN.- Inter-Organizational Processes.

Fields of interestInformation Systems Applications (incl.Internet); Business Information Systems; Computer Appl. in Administrative Data Processing

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due November 2013

2013. XI, 386 p. 238 illus., 1 in color. Hardcover7 * € (D) 64,19 | € (A) 65,99 | sFr 80,007 € 59,99 | £53.99ISBN 978-3-642-40795-6

9<HTOGPC=eahjfg>

A. Gkoulalas-Divanis, IBM Research - Ireland, Mulhuddart, Ireland; A.  Labbi, IBM Research - Zurich, Rüschlikon, Switzerland (Eds)

Large-Scale Data AnalyticsThis edited book collects state-of-the-art research related to large-scale data analytics that has been accomplished over the last few years. This is among the first books devoted to this important area based on contributions from diverse scientific areas such as databases, data mining, supercom-puting, hardware architecture, data visualization, statistics, and privacy. There is increasing need for new approaches and technologies that can analyze and synthesize very large amounts of data, in the order of petabytes, that are generated by massively distributed data sources. This requires new distrib-uted architectures for data analysis.

Features 7 Provides cutting-edge research in large-scale data analytics from diverse scientific areas 7 Sur-veys varied subject areas and reports on individual results of research in the field 7 Shares many tips and insights into large-scale data analytics from authors and editors with long-term experience and specialization in the field

Contents The Family of Map-Reduce.- Optimization of Massively Parallel Data Flows.- Mining Tera-Scale Graphs with „Pegasus“.- Customer Analyst for the Telecom Industry.- Machine Learning Algorithm Acceleration using Hybrid (CPU-MPP) MapRe-duce Clusters.- Large-Scale Social Network Analy-sis.- Visual Analysis and Knowledge Discovery for Text.- Practical Distributed Privacy-Preserving Data Analysis at Large Scale.

Fields of interestDatabase Management; Information Systems and Communication Service; Business Information Systems

Target groupsResearch

Product categoryContributed volume

Due February 2014

2014. X, 280 p. 80 illus. Hardcover7 approx. * € (D) 85,59 | € (A) 87,99 | sFr 108,507 approx. € 79,99 | £73.50ISBN 978-1-4614-9241-2

9<HTMERB=ejcebc>

M. Gregory, RMIT University, Melbourne, VIC, Australia; D. Glance, University of Western Australia, Crawley, WA, Australia

Security and the Networked SocietyThis book examines technological and social events during 2011 and 2012, a period that saw the rise of the hacktivist, the move to mobile platforms, and the ubiquity of social networks. It covers key technological issues such as hacking, cyber-crime, cyber-security and cyber-warfare, the internet, smart phones, electronic security, and information privacy. This book traces the rise into prominence of these issues while also exploring the resulting cultural reaction. The authors’ analysis forms the basis of a discussion on future technological directions and their potential impact on society. The book includes forewords by Professor Margaret Gardner AO, Vice-Chan-cellor and President of RMIT University, and by Professor Robyn Owens, Deputy Vice-Chancellor (Research) at the University of Western Australia. Security and the Networked Society provides a reference for professionals and industry analysts studying digital technologies.

Features 7 Provides a unique collection of analyses of technological events positioned in their social and historical context 7 Maximizes reader insights into recent technologies including their use, mis-use and impact 7 Equips readers to predict how technology is likely to evolve in the future

Contents Introduction.- Hacking.- Cyber Crime, Cyber Security and Cyber Warfare.- Internet.- Smart Phones.- Applications.- Predictions.

Fields of interestInformation Systems and Communication Service; Systems and Data Security; Computer Communi-cation Networks

Target groupsProfessional/practitioner

Product categoryProfessional book

Due October 2013

2013. X, 296 p. Hardcover7 * € (D) 106,99 | € (A) 109,99 | sFr 133,507 € 99,99 | £90.00ISBN 978-3-319-02389-2

9<HTODMJ=acdijc>

Page 4: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

Computer Science springer.com/NEWSonline

58

B. Goertzel, G/F 51C Lung Mei Village, Tai Po, Hong Kong, People‘s Republic of China

Engineering General Intelligence: Cognitive Synergy, Embodied Learning and the CogPrime ArchitecturePart 1

The work outlines a novel conceptual and theo-retical framework for understanding Artificial General Intelligence, and based on this framework outlines a practical roadmap for the development of AGI with capability at the human level and ultimately beyond.

Features 7 No other book (or research paper) provides a detailed, carefully-argued roadmap for getting from the present state of AI technology to the creation of Artificial General Intelligence with capability at the human level and beyond 7 No other book (or research paper) bridges the gap between the abstract, mathematical theory of general intelligence and real-world general intel-ligence as demonstrated by humans and other practically achievable AGI systems 7 The book gives concrete guidance for the creation of virtual worlds and robotic environments suitable for the education and development of advanced Artificial General Intelligence systems

Fields of interestArtificial Intelligence (incl. Robotics); Computa-tional Intelligence; Complexity

Target groupsResearch

Product categoryMonograph

Due February 2014

2014. Approx. 450 p. 20 illus. (Atlantis Thinking Machines, Volume 5) Hardcover7 approx. * € (D) 101,64 | € (A) 104,49 | sFr 126,507 approx. € 94,99 | £85.50ISBN 978-94-6239-026-3

9<HTUERC=djacgd>

B. Goertzel, G/F 51C Lung Mei Village, Tai Po, Hong Kong, People‘s Republic of China

Engineering General Intelligence: Cognitive Synergy, Embodied Learning and the CogPrime ArchitecturePart 2

The work outlines a detailed blueprint for the cre-ation of an Artificial General Intelligence system with capability at the human level and ultimately beyond, according to the CogPrime AGI design and the OpenCog software architecture.

Features 7 No other book (or research paper) provides a detailed, carefully-argued design for the creation of Artificial General Intelligence with capability at the human level and beyond 7 No other book (or research paper) bridges the gap between the mathematical and conceptual theory of general intelligence, and the practical engineering of real-world AGI software systems with compre-hensive human-level capabilities 7 The book gives concrete guidance for the integration of AI subsystems created according to diverse theo-retical paradigms such as evolutionary learning, probabilistic reasoning, attractor neural networks and computational linguistics

Field of interestArtificial Intelligence (incl. Robotics)

Target groupsResearch

Product categoryMonograph

Due February 2014

2014. Approx. 450 p. 20 illus. (Atlantis Thinking Machines, Volume 6) Hardcover7 approx. * € (D) 101,64 | € (A) 104,49 | sFr 126,507 approx. € 94,99 | £85.50ISBN 978-94-6239-029-4

9<HTUERC=djacje>

K. Haataja, K. Hyppönen, S. Pasanen, P. Toivanen, University of Eastern Finland, Kuopio, Finland

Bluetooth Security AttacksComparative Analysis, Attacks, and Countermeasures

Bluetooth technology has enjoyed tremendous success, and it‘s now employed in billions of devices for short-range wireless data and real-time audio or video transfer. In this book the authors provide an overview of Bluetooth security. They examine network vulnerabilities and provide a literature-review comparative analysis of recent security attacks. They analyze and explain related countermeasures, including one based on secure simple pairing, and they also propose a novel at-tack that works against all existing Bluetooth ver-sions. They conclude with a discussion on future research directions.

Features 7 Authors among the first to research Bluetooth vulnerabilities in an academic setting 7 Clearly explains vulnerabilities and countermea-sures 7 Suitable for practitioners and research-ers engaged with the security of networked and mobile devices

Contents Chap. 1 - Introduction.- Chap. 2 - Overview of Bluetooth Security.- Chap. 3 - Bluetooth Network Vulnerabilities.- Chap. 4 - Comparative Analysis of Bluetooth Security Attacks.- Chap. 5 - Meet-in-the-Middle (MITM) Attacks on Bluetooth.- Chap. 6 - Countermeasures.- Chap. 7 - New Practical Attack.- Chap. 8 - Conclusion and Future Work References.

Fields of interestData Structures, Cryptology and Information Theory; Systems and Data Security; Computer Communication Networks

Target groupsProfessional/practitioner

Product categoryBrief

Due October 2013

2013. IV, 92 p. 31 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-642-40645-4

9<HTOGPC=eagefe>

Page 5: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

News 10/2013 Computer Science

59

A. Hameurlain, Paul Sabatier University, Toulouse, France; J. Küng, R. Wagner, Universität Linz, Linz, Austria; S. W. Liddle, Brigham Young University, Provo, UT, USA; K.-D. Schewe, Software Competence Center, Hagenberg, Austria; X. Zhou, University of Queensland Dept. Computer Science, Brisbane, QLD, Australia (Eds)

Transactions on Large-Scale Data- and Knowledge-Centered Systems XSpecial Issue on Database- and Expert-Systems Applications

The LNCS journal Transactions on Large-Scale Data- and Knowledge-Centered Systems focuses on data management, knowledge discovery, and knowledge processing, which are core and hot topics in computer science. Since the 1990s, the Internet has become the main driving force behind application development in all domains. An increase in the demand for resource sharing across different sites connected through networks has led to an evolution of data- and knowledge-management systems from centralized systems to decentralized systems enabling large-scale distributed applications providing high scalability. Current decentralized systems still focus on data and knowledge as their main resource.

Features 7 Contains in-depth research papers on data-base- and expert-systems applications 7 Includes a preface by the guest editors, freely available on SpringerLink, introducing each paper in turn 7 Both theoretical and applicational aspects are covered

Fields of interestData Mining and Knowledge Discovery; Database Management; Computer Communication Net-works

Target groupsResearch

Product categoryContributed volume

Due September 2013

2013. XI, 201 p. (Lecture Notes in Computer Science / Transactions on Large-Scale Data- and Knowledge-Centered Systems, Volume 8220) Softcover7 approx. * € (D) 67,41 | € (A) 69,30 | sFr 84,007 approx. € 63,00 | £56.99ISBN 978-3-642-41220-2

9<HTOGPC=ebccac>

C. Hofman, European Domain Centre, Frederiksberg C, Denmark; S. Keates, University of Abertay Dundee, Dundee, UK

Countering Brandjacking in the Digital Age… and Other Hidden Risks to Your Brand

The rise of the Internet and social media in par-ticular offer great opportunities for brand owners to increase business and brand recognition. While this has clearly been of benefit to brand owners, who have seen a consequent rise in the value of their brands, it simultaneously makes those brands more attractive for exploitation or attack by oth-ers. Brand risks can come in many different types and this book provides examples of how these risks can arise as well as providing quantitative estimates of the adverse impacts that can result from such risks. Brand owners need to be aware of the risks and of the need to develop strategies for identifying and managing them.

Features 7 Presents an overview of brand risks, with a particular focus on those arising from the Internet and social media, such as cybersquatting, domain name infringements and counterfeiting 7 De-scribes an approach to creating a brand risk man-agement process tailored to the particular needs of brand owners 7 Presents numerous examples of real-world brand risks

Contents An Introduction to Brand Risk.- An Overview of Branding and its Associates Risks.- Brand Risk Management Theory.- Designing a Brand Risk Management Process.- Brand Risk in Cyberspace.- Appendix: Norwegian Air Shuttle Calculation.

Fields of interestLegal Aspects of Computing; e-Commerce/e-business

Target groupsResearch

Product categoryBrief

Due November 2013

2014. VIII, 112 p. 18 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4471-5579-9

9<HTMEPH=bffhjj>

J. Hunt, University of the West of England, Bristol, UK

Scala Design PatternsPatterns for Practical Reuse and Design

Scala is a new and exciting programming language that is a hybrid between object oriented languages such as Java and functional languages such as Haskell.

Features 7 Interprets purely Functional Patterns in terms of design patterns for use in Scala's hybrid style 7 Illustrates how to maximise code reuse through functions, currying, and dependency injection using Scala language facilities 7 Pres-ents the Gang of Four Design Patterns using Scala language structures (which differ significantly from languages such as Java with the inclusion of Functions as first class language elements)

Contents Author’s Note.- Part I – Introduction.- Introduc-tion.- Design Patterns.- UML and Scala.- Part II – Fundamental Patterns.- Immutability.- Singleton.- Marker Trait.- Delegation.- Part III – Code Reuse Patterns.- Lazy Parameters.- Partially Applied Functions.- Trait Based Template Operation.- Stackable Traits.- Currying and Code Reuse.- Cake Pattern.- Structural Injection.- Implicit Injection Pattern.- Part IV – Gang of Four Patterns.- Gang of Four Design Patterns.- Gang of Four Patterns Catalogs.- Factory Operation.- Abstract Factory Pattern.- Builder.- Adapter Pattern.- Decorator.- Facade.- Flyweight.- Proxy.- Filter.- Bridge.- Chain of Responsibility.- Command.- Strategy.- Media-tor.- Observer.- State.- Visitor.- Memento.- Part V – Functional Design Patterns.- Functor.- Applica-tive Functor.- Monoid Pattern.- Monad Pattern.- Foldable.- Zipper.- Lens Pattern.- View Pattern.- Arrow Pattern.

Fields of interestSoftware Engineering/Programming and Operat-ing Systems; Programming Techniques

Target groupsProfessional/practitioner

Product categoryMonograph

Due November 2013

2013. X, 399 p. 90 illus., 49 in color. Hardcover7 * € (D) 90,94 | € (A) 93,49 | sFr 113,507 € 84,99 | £75.95ISBN 978-3-319-02191-1

9<HTODMJ=acbjbb>

Page 6: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

Computer Science springer.com/NEWSonline

60

S. Jajodia, K. Kant, George Mason University, Fairfax, VA, USA; P. Samarati, University of Milan, Crema, Italy; A. Singhal, National Institute of Standards and Technology (NIST), Gaithersburg, MD, USA; V. Swarup, The MITRE Corporation, McLean, VA, USA; C. Wang, Information Sciences Directorate, Triangle Park, NC, USA (Eds)

Secure Cloud ComputingContents Cryptographic Key Management Issues and Chal-lenges in Cloud Services.- Costs and Security in Clouds.- Hardware-enhanced Security for Cloud Computing.- Cloud Computing Security: What Changes with Software-Defined Networking?.- Proof of Isolation for Cloud Storage.- Selective and Fine-Grained Access to Data in the Cloud.- En-abling Collaborative Data Authorization Between Enterprise Clouds.- Making Query Execution Over Encrypted Data Practical.- Privacy-pre-serving Keyword Search over Encrypted Data in Cloud Computing.- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.- Secure Mission-Centric Operations in Cloud Computing.- Computational Decoys for Cloud Security.- Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing.- Software Cruising: A New Technol-ogy for Building Concurrent Software Moni-tor.- Controllability and Observability of Risk and Resilience in Cyber-Physical Cloud Systems.

Fields of interestSystems and Data Security; Information Systems Applications (incl.Internet); Computer Communi-cation Networks

Target groupsProfessional/practitioner

Product categoryContributed volume

Due February 2014

2014. X, 340 p. 100 illus. Hardcover7 approx. * € (D) 106,99 | € (A) 109,99 | sFr 128,507 approx. € 99,99 | £87.00ISBN 978-1-4614-9277-1

9<HTMERB=ejchhb>

V. Kagan, SentiMetrix©, Inc., Bethesda, MD, USA; E. Rossini, Roosevelt University, Chicago, IL, USA; D. Sapounas, Center for International Rehabilitation, Washington, DC, USA

Sentiment Analysis for PTSD SignalsThis book describes a computational framework for real-time detection of psychological signals related to Post-Traumatic Stress Disorder (PTSD) in online text-based posts, including blogs and web forums. Further, it explores how emerging computational techniques such as sentiment min-ing can be used in real-time to identify posts that contain PTSD-related signals, flag those posts, and bring them to the attention of psychologists, thus providing an automated flag and referral capabil-ity. The use of sentiment extraction technologies allows automatic in-depth analysis of opinions and emotions expressed by individuals in their online posts. By training these automated systems with input from academic and clinical experts, the systems can be refined so that the accuracy of their detection of possible PTSD signals is comparable to that of psychologists reading the same online posts. While a portion of the literature on this and related topics explores the correlation between text patterns in archived documents and PTSD, no literature to date describes a system performing real-time analysis. Our system allows analysts to quickly identify, review, and validate online posts which have been flagged as exhibiting signs or symptoms of PTSD and enables follow-up, thus allowing for the presentation of treatment options to the authors of those posts.

Contents Introduction.- Introduction to PTSD Signals.- Data Source.- Text Analytics.- Scoring Engine.- System Overview.- Conclusions.

Fields of interestArtificial Intelligence (incl. Robotics); Database Management; Psychology, general

Target groupsResearch

Product categoryBrief

Due October 2013

2014. XII, 90 p. 22 illus., 14 in color. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-3096-4

9<HTMERB=edajge>

X. Liu, X. Li, University of Florida, Gainesville, FL, USA

Location Privacy Protection in Mobile NetworksThis SpringerBrief analyzes the potential privacy threats in wireless and mobile network envi-ronments, and reviews some existing works. It proposes multiple privacy preserving techniques against several types of privacy threats that are targeting users in a mobile network environment. Depending on the network architecture, different approaches can be adopted. The first proposed ap-proach considers a three-party system architecture where there is a trusted central authority that can be used to protect users’ privacy. The second ap-proach considers a totally distributed environment where users perform privacy protection by them-selves. Finally, more general system architecture is discussed including how a semi-trusted server may exist, but users need to collaborate to achieve maximized privacy protection. This brief is de-signed for researchers and professionals working with privacy preservation, mobile networks, and threat models. The variety of approaches presented makes it useful for students as well.

Contents Introduction.- Privacy Preservation Using Multiple Mix Zones.- Privacy Preservation Using Game-Theoretic Approach.- Privacy Preserva-tion Using Logical Coordinates.- Conclusion and Future Directions.

Fields of interestSystems and Data Security; Computer Communi-cation Networks; Data Encryption

Target groupsResearch

Product categoryBrief

Due October 2013

2014. XI, 78 p. 23 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-1-4614-9073-9

9<HTMERB=ejahdj>

Page 7: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

News 10/2013 Computer Science

61

M. Martellini, Landau Network Centro Volta / ICIS, Como, Italy (Ed)

Cyber SecurityDeterrence and IT Protection for Critical Infrastructures

The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present pos-sible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also pro-vides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resilience and security of Industrial Control Systems. The combination of contextual overview and future directions in the field makes this brief a useful resource for researchers and professionals studying systems security, data secu-rity and data structures.

Features 7 Includes state-of-the-art documentation on the deterrence power of cyber attacks 7 Analyzes the possibility of cyber attacks towards critical chemical industry and chemical safety infrastruc-ture 7 Proposes methods for protection and resilience for Industrial Control Systems

Contents Cyber as Deterrent.- Cyber Security and Cyber Weapons: is Nonproliferation possible?.- Cyber Security for Nuclear Power Plants.- Cyber Security for Chemical Plants.- From Fortress to Resil-ience.- Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures.

Fields of interestSystems and Data Security; Information Systems Applications (incl.Internet); Data Encryption

Target groupsResearch

Product categoryBrief

Due October 2013

2013. XII, 79 p. 10 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-02278-9

9<HTODMJ=acchij>

B. Schölkopf, MPI for Intelligent Systems, Tübingen, Germany; Z. Luo, Royal Holloway, University of London, Egham, UK; V. Vovk, University of London Royal Holloway, Egham, Surrey, UK (Eds)

Empirical InferenceFestschrift in Honor of Vladimir N. Vapnik

Contents Part I - History of Statistical Learning Theory.- Chap. 1 - In Hindsight: Doklady Akademii Nauk SSSR, 181(4), 1968.- Chap. 2 - On the Uniform Convergence of the Frequencies of Occurrence of Events to Their Probabilities.- Chap. 3 - Early His-tory of Support Vector Machines.- Part II - Theory and Practice of Statistical Learning Theory.- Chap. 4 - Some Remarks on the Statistical Analysis of SVMs and Related Methods.- Chap. 5 - Explaining AdaBoost.- Chap. 6 - On the Relations and Dif-ferences Between Popper Dimension, Exclusion Dimension and VC-Dimension.- Chap. 7 - On Learnability, Complexity and Stability.- Chap. 8 - Loss Functions.- Chap. 9 - Statistical Learning Theory in Practice.- Chap. 10 - PAC-Bayesian The-ory.- Chap. 11 - Kernel Ridge Regression.- Chap. 12 - Multi-task Learning for Computational Biol-ogy: Overview and Outlook.- Chap. 13 - Semi-supervised Learning in Causal and Anticausal Settings.- Chap. 14 - Strong Universal Consistent Estimate of the Minimum Mean-Squared Error.- Chap. 15 - The Median Hypothesis.- Chap. 16 - Efficient Transductive Online Learning via Ran-domized Rounding.- Chap. 17 - Pivotal Estima-tion in High-Dimensional Regression via Linear Programming.- Chap. 18 - Some Observations on Sparsity Inducing Regularization Methods for Machine Learning.- Chap. 19 - Sharp Oracle Inequalities in Low Rank Estimation.- Chap. [...]

Fields of interestArtificial Intelligence (incl. Robotics); Statistical Theory and Methods; Probability and Statistics in Computer Science

Target groupsResearch

Product categoryMonograph

Due November 2013

2013. XXVI, 293 p. 61 illus., 39 in color. Hardcover7 * € (D) 101,64 | € (A) 104,49 | sFr 126,507 € 94,99 | £85.50ISBN 978-3-642-41135-9

9<HTOGPC=ebbdfj>

R. I. Soare, The University of Chicago, Chicago, IL, USA

Computability Theory and ApplicationsThe Art of Classical Computability

Features 7 Author is among the world's leading authori-ties on the topic of computability 7 Content has been thoroughly class-tested for many years by hundreds of lecturers and teachers in this field 7 Emphasizes the art of computability, that is, a skill to be practiced but also important an esthetic sense of beauty and taste in mathematics

Contents Part I Foundations of Computability.- Chap. 1 De-fining Computability.- Chap. 2 Computably Enu-merable Sets.- Chap. 3 Turing Reducibility.- Chap. 4 The Arithmetical Hierarchy.- Chap. 5 Classifying Computably Enumerable Sets.- Chap. 6 Oracle Constructions and Forcing.- Chap. 7 The Finite Injury Priority Method.- Part II Infinite Injury and the Tree Method.- Chap. 8 Infinite Injury.- Chap. 9 The Tree Method and Minimal Pairs.- Chap. 10 More Tree Proofs.- Part III Games in Comput-ability.- Chap. 11 Banach--Mazur Games.- Chap. 12 Gale--Stewart Games.- Chap. 13 Lachlan Games.- Chap. 14 Index Sets of Computably Enu-merable Sets.- Chap. 15 Pinball Machines.- Part IV Definability and Automorphisms.- Chap. 16 Definable Properties of Computably Enumerable Sets.- Chap. 17 Automorphisms of Computably Enumerable Sets.- Part V The History and Art of Computability.- Chap. 18 The History and Art of Computability.- Chap. 19 Classical Computability and Classical Art.- App. A Standard Definitions.- App. B Hints for Exercises.- Bibliography.- In-dexes.

Fields of interestTheory of Computation; Mathematics of Comput-ing; Mathematical Logic and Foundations

Target groupsGraduate

Product categoryGraduate/Advanced undergraduate textbook

Due January 2014

2014. Approx. 430 p. (Theory and Applications of Computability) Hardcover7 approx. * € (D) 64,15 | € (A) 65,95 | sFr 80,007 approx. € 59,95 | £53.99ISBN 978-3-642-31932-7

9<HTOGPC=dbjdch>

Page 8: AGT Approaches in Integrative Introduction to Public Key ... · Fundamentals of Parameterized Complexity Contents Introduction.- ... Introduction to BizTalk Server.- Part II Messaging.-

Computer Science springer.com/NEWSonline

62

M. R. Vieira, IBM Research Laboratory - Brazil, Rio de Janeiro, Brazil; V. J. Tsotras, Bourns College of Engineering, Riverside, CA, USA

Spatio-Temporal DatabasesComplex Motion Pattern Queries

This brief presents several new query process-ing techniques, called complex motion pattern queries, specifically designed for very large spatio-temporal databases of moving objects. The brief begins with the definition of flexible pattern queries, which are powerful because of the integration of variables and motion patterns. This is followed by a summary of the expressive power of patterns and flexibility of pattern queries. The brief then present the Spatio-Temporal Pattern System (STPS) and density-based pattern queries. STPS databases contain millions of records with information about mobile phone calls and are designed around cellular towers and places of interest. Density-based pattern queries capture the aggregate behavior of trajectories as groups. Several evaluation algorithms are presented for finding groups of trajectories that move together in space and time, i.e. within a predefined distance to each other. Finally, the brief describes a generic framework, called DivDB, for diversifying query results. Two new evaluation methods, as well as several existing ones, are described and tested in the proposed DivDB framework. The efficiency and effectiveness of all the proposed complex mo-tion pattern queries are demonstrated through an extensive experimental evaluation using real and synthetic spatio-temporal databases.

Contents Introduction.- Flexible Pattern Queries.- Pattern Queries for Mobile Phone-Call Databases.- Flock Pattern Queries.- Diversified Pattern Queries.- Conclusion.

Fields of interestDatabase Management; Data Mining and Knowl-edge Discovery; Pattern Recognition

Target groupsResearch

Product categoryBrief

Due October 2013

2013. IX, 85 p. 46 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-02407-3

9<HTODMJ=aceahd>

R. Wong, Nottingham Trent University, Nottingham, UK

Data Security Breaches and Privacy in EuropeData Security Breaches and Privacy in Europe aims to consider data protection and cybersecu-rity issues; more specifically, it aims to provide a fruitful discussion on data security breaches. A detailed analysis of the European Data Protection framework will be examined. In particular, the Data Protection Directive 95/45/EC, the Directive on Privacy and Electronic Communications and the proposed changes under the Data Protection Regulation (data breach notifications) and its implications are considered. This is followed by an examination of the Directive on Attacks against information systems and a discussion of the proposed Cybersecurity Directive, considering its shortcomings and its effects. The author concludes by looking at whether a balance can be drawn by the current and proposed Data Protection frame-work to protect against data security breaches and considers what more needs to be achieved.

Contents Foreword.- Introduction.- Data Protection Directive 95/46/EC.- The Amended Directive on Privacy and Electronic Communications.- Art. 29 Working Party: Future of Privacy.- European Commission Communication Opinion 2010.- Proposed Data Protection Regulation 2012: Data Security Breach Notifications.- Framework Decision 2005/222/JHA and the Directive against Information Systems.- European Data Protection Supervisor’s Opinion on Cybersecurity.- Cyberse-curity Directive 2013.- Criticism of the Cyberse-curity Directive.- Concluding Remarks.

Fields of interestComputers and Society; International IT and Me-dia Law, Intellectual Property Law; Criminology & Criminal Justice

Target groupsResearch

Product categoryBrief

Due November 2013

2014. VII, 70 p. (SpringerBriefs in Cybersecurity) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £35.99ISBN 978-1-4471-5585-0

9<HTMEPH=bffifa>

Z. Zheng, University of Waterloo, Waterloo, ON, Canada; L. X. Cai, Huawei Technologies Inc., Rolling Meadows, IL, USA; X. Shen, University of Waterloo, Waterloo, ON, Canada

Sustainable Wireless NetworksThis brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their energy and put the net-work out of service due to the unreliable energy supply. This brief also studies network resource management issues in green wireless networks to minimize cost. It jointly considers the relay node (RN) placement and sub-carrier allocation (RNP-SA) issues in wireless networks with sustainable energy, and then formulates the problem into a mixed integer non-linear programming problem. Concise and informative, this brief is a useful resource for professionals or researchers studying wireless networks, communication networks, and energy efficiency. Advanced-level students inter-ested in energy technology or communications engineering will also find the material valuable.

Contents Introduction.- Background and Literature Survey.- Joint Relay Placement and Sub-carrier Allocation in Sustainable Wireless Networks.- Analysis and Resource Management for Sustainable Wireless Networks.- Conclusions and Future Directions.

Fields of interestComputer Communication Networks; Energy Technology; Renewable and Green Energy

Target groupsResearch

Product categoryBrief

Due October 2013

2013. I, 67 p. 19 illus. (SpringerBriefs in Computer Science) Softcover7 * € (D) 53,49 | € (A) 54,99 | sFr 67,007 € 49,99 | £44.99ISBN 978-3-319-02468-4

9<HTODMJ=acegie>