Joachim Biskup - Böcker
Visar alla böcker från författaren Joachim Biskup. Handla med fri frakt och snabb leverans.
6 produkter
6 produkter
505 kr
Skickas inom 10-15 vardagar
Dieses Buch behandelt die Grundlagen von Informationssystemen, die als Hilfsmittel verstanden werden. Ausgehend von Einfuhrungen in die semantische Modellierung und die mathematische Logik werden ein logikorientiertes, das relationale und objektorientierte Datenmodell vorgestellt. Fur die schichtenmassige Architektur werden insbesondere die Ubersetzungen von machtigen, benutzernahen Konstrukten in rechnernahe Konzepte betrachtet. Transaktionen werden vorrangig unter dem Gesichtspunkt der Serialisierbarkeit untersucht. Die wichtigen Fragestellungen der Optimierung logikorientierter und relationaler Anfragen sowie der Theorie des Entwurfs von Datenbankschemen werden vertiefend dargestellt. Dieses Buch wendet sich an alle an Grundlagen interessierte Studenten, Wissenschaftler und Entwickler, die Informationssysteme benutzen oder selbst entwerfen wollen.
MFDBS 87
1st Symposium on Mathematical Fundamentals of Database Systems, Dresden, GDR, January 19-23, 1987. Proceedings
Häftad, Engelska, 1988
556 kr
Skickas inom 10-15 vardagar
This volume contains the 13 best of the 18 papers presented at the first MFDBS conference held in Dresden, GDR, January 19-23, 1987. A short summary of the two panel discussions is also included. The volume is intended to be a reflection of the current state of knowledge and a guide to further development in database theory. The main topics covered are: theoretical fundaments of the relational data model (dependency theory, design theory, null values, query processing, complexity theory), and of its extensions (graphical representations, NF2-models), conceptual modelling of distributed database management systems and the relationship between logic and databases.
Database Theory - ICDT '92
4th International Conference, Berlin, Germany, October 14-16, 1992. Proceedings
Häftad, Engelska, 1992
556 kr
Skickas inom 10-15 vardagar
The papers in this volume were presented at theInternational Conference on Database Theory, held in Berlin,Germany, October 14-16, 1992. This conference initiated themerger of two series of conferences on theoretical aspectsof databases that were formed in parallel by differentscientific communities in Europe. The first series was knownas the International Conference on Database Theory and thesecond as the Symposium on Mathematical Fundamentals ofDatabase Systems. In the future, ICDT will be organizedevery two years, alternating with the more practicallyoriented series of conferences on Extending DatabaseTechnology (EDBT). The volume contains 3 invited lectures and 26 contributedpapers selected from a total of 107 submissions. The papersare organized into sections on constraints anddecomposition, query languages, updates and activedatabases, concurrency control and recovery, knowledgebases, datalog complexity and optimization, objectorientation, information capacity and security, and datastructures and algorithms. Two of the invited papers surveyresearch into theoretical database issues done in EasternEurope during the past decade.
Computer Security - ESORICS 2007
12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings
Häftad, Engelska, 2007
1 105 kr
Skickas inom 10-15 vardagar
This book constitutes the refereed proceedings of the 12th European Symposium on Research in Computer Security, ESORICS 2007, held in Dresden, Germany in September 2007. It features 39 revised full papers. ESORICS is confirmed as the European research event in computer security. It presents original research contributions, case studies and implementation experiences that address any aspect of computer security, in theory, mechanisms, applications, or practical experience.
1 638 kr
Skickas inom 10-15 vardagar
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.
1 638 kr
Skickas inom 10-15 vardagar
This monograph on Security in Computing Systems: Challenges, Approaches and Solutions aims at introducing, surveying and assessing the fundamentals of se- rity with respect to computing. Here, “computing” refers to all activities which individuals or groups directly or indirectly perform by means of computing s- tems, i. e. , by means of computers and networks of them built on telecommuni- tion. We all are such individuals, whether enthusiastic or just bowed to the inevitable. So, as part of the ‘‘information society’’, we are challenged to maintain our values, to pursue our goals and to enforce our interests, by consciously desi- ing a ‘‘global information infrastructure’’ on a large scale as well as by approp- ately configuring our personal computers on a small scale. As a result, we hope to achieve secure computing: Roughly speaking, computer-assisted activities of in- viduals and computer-mediated cooperation between individuals should happen as required by each party involved, and nothing else which might be harmful to any party should occur. The notion of security circumscribes many aspects, ranging from human qua- ties to technical enforcement. First of all, in considering the explicit security requirements of users, administrators and other persons concerned, we hope that usually all persons will follow the stated rules, but we also have to face the pos- bility that some persons might deviate from the wanted behavior, whether ac- dently or maliciously.