الكتب الالكترونية

عدد الكتب: 21 - 40 /116
978-3-7643-7394-8
Contemporary Cryptology / Public key encription / Random functions / computational complexity / cryptography / cryptology

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...

اقرأ المزيد
978-0-387-34189-7
CryptoGraphics

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...

اقرأ المزيد
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-030-65411-5
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-658-35494-7
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
978-3-030-70890-0
EU-Turkey Relations Theories, Institutions, and Policies

This book explores the new complexities and ambiguities that epitomize EU-Turkey relations. With a strong focus on the developments ...

اقرأ المزيد
978-1-4020-3518-0
Economics, Sustainability, and Natural Resources

The economics of sustainability is much more complex than the neoclassical (Newtonian) economic approach to economic efficiency. ...

اقرأ المزيد
978-981-13-2859-6
Emerging States at Crossroads

This volume analyzes the economic, social, and political challenges that emerging states confront today. Notwithstanding ...

اقرأ المزيد
978-3-319-51103-0
Error-Correction Coding and Decoding

This book discusses both the theory and practical applications of self-correcting data, commonly known as error-correcting ...

اقرأ المزيد
978-981-10-7548-3
Evolution, Monitoring and Predicting Models of Rockburst

This open access book focuses on investigating predicting precursor information and key points of rockburst in mining engineering ...

اقرأ المزيد
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

اقرأ المزيد
978-3-540-73107-8
Human-Computer Interaction. Interaction Platforms and Techniques

The 12th International Conference on Human-Computer Interaction, HCI Inter- tional 2007, was held in Beijing, P.R. This volume, ...

اقرأ المزيد
978-1-4842-7799-7
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

اقرأ المزيد
978-3-030-57850-3
Implementing Responsible Research and Innovation Organisational and National Conditions

we give an overview of the book and the RRI-Practice study. The book is an analysis of data collected in the RRI-Practice ...

اقرأ المزيد
978-3-540-31930-6
Information Security (vol. # 3650)

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...

اقرأ المزيد
978-3-540-71093-6
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

اقرأ المزيد
عدد الكتب: 21 - 40 /116