الكتب الالكترونية

عدد الكتب: 1 - 20 /210
978-0-8176-4432-1
103 Trigonometry Problems

103 Trigonometry Problems contains highly-selected problems and solutions used in the training and testing of the USA International ...

اقرأ المزيد
978-1-4020-3378-0
A Subtle and Mysterious Machine

Walter Charleton (1619-1707) has been widely depicted as a natural philosopher whose intellectual career mirrored the intellectual ...

اقرأ المزيد
978-0-387-27716-5
Access Control Systems

Access Control Systems: Security, Identity Management and Trust Models provides a thorough introduction to the foundations ...

اقرأ المزيد
978-3-319-73990-8
Access to Online Resources

The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved ...

اقرأ المزيد
978-3-540-73871-8
Advanced Data Mining and Applications

The Third International Conference on Advanced Data Mining and Applications (ADMA) organized in Harbin, China continued the ...

اقرأ المزيد
978-3-540-74549-5
Advances in Biometrics

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets ...

اقرأ المزيد
978-3-540-74549-5
Advances in Biometrics

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets ...

اقرأ المزيد
978-1-84628-921-7
Advances in Biometrics : Sensors, Algorithms and Systems

This book presents a comprehensive treatment of biometrics and offers coverage of the entire gamut of topics in the field, ...

اقرأ المزيد
978-3-540-37433-6
Advances in Cryptology - CRYPTO 2006

This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held ...

اقرأ المزيد
978-3-540-47700-6
Advances in Information and Computer Security

this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...

اقرأ المزيد
978-3-030-13761-8
Affect and Mathematics Education

This book, inspired by the ICME 13 topic study group “Affect, beliefs and identity in mathematics education”, presents ...

اقرأ المزيد
978-0-306-48539-8
An Archaeology of Colonial Identity

This book is the based on the work of many people, and while I discuss many of them in the general context of this book in ...

اقرأ المزيد
978-1-4020-8596-3
Ancient Philosophy of the Self

This volume explores the various ways in which selfhood was approached and conceptualised in antiquity. They also describe ...

اقرأ المزيد
978-3-540-72738-5
Applied Cryptography and Network Security

The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...

اقرأ المزيد
978-3-540-72738-5
Applied Cryptography and Network Security

The book is organized in topical sections on signature schemes, computer and network security, cryptanalysis, group-oriented ...

اقرأ المزيد
978-3-540-68914-0
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ...

اقرأ المزيد
978-3-7643-8751-8
Approximation of Additive Convolution-Like Operators : Real C*-Algebra Approach

Various aspects of numerical analysis for equations arising in boundary integral equation methods have been the subject of ...

اقرأ المزيد
9781839761911
Architect, verb.: The New Language of Building / Reinier de Graaf

Leading architect Reinier de Graaf De Graaf punctures the myths behind the debates on what contemporary architecture is, ...

اقرأ المزيد
978-3-540-37751-1
Artificial Immune Systems (vol. # 4163)

ICARIS 2006 is the ?fth instance of a series of conferences dedicated to the comprehension and the exploitation of immunological ...

اقرأ المزيد
NoIMG
Attendnce system during covid-19 / Amer Albezreh ; Iyad Joudallah ; Mohamad Yaseen Shbeeb

Authentication system has become a hot topic in the field of security, one of the most interested methods of authentication ...

اقرأ المزيد
عدد الكتب: 1 - 20 /210