الكتب الالكترونية

عدد الكتب: 21 - 40 /86
978-3-540-70567-3
Data and Applications Security XXII : 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security London, UK, July 13-16, 2008 Proceedings

This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...

اقرأ المزيد
978-3-540-70542-0
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

اقرأ المزيد
978-3-540-73198-6
Effective IT Service Management

IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...

اقرأ المزيد
978-3-540-73198-6
Effective IT Service Management

IT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...

اقرأ المزيد
978-3-540-85204-9
Electronic Government : 7th International Conference, EGOV 2008, Turin, Italy, August 31 - September 5, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...

اقرأ المزيد
978-1-84800-221-0
Enterprise Interoperability III : New Challenges and Industrial Approaches

This book provides knowledge for cost savings and business improvement as well as new technical solutions. Composed of over ...

اقرأ المزيد
978-3-030-58617-1
Ernst Denert Award for Software Engineering 2019 Practice Meets Foundations

This book provides an overview of the dissertations of the five nominees for the Ernst Denert Award for Software Engineering ...

اقرأ المزيد
NoIMG
Ernst Denert Award for Software Engineering 2020 : Practice Meets Foundations

This book provides an overview of the dissertations of the eleven nominees for the Ernst Denert Award for Software Engineering ...

اقرأ المزيد
978-3-540-85230-8
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

اقرأ المزيد
978-3-540-78917-8
Formal Methods and Testing : An Outcome of the FORTEST Network, Revised Selected Papers

This book constitutes the thoroughly refereed and peer-reviewed outcome of the Formal Methods and Testing (FORTEST) network ...

اقرأ المزيد
978-3-540-69403-8
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

اقرأ المزيد
978-3-540-68073-4
High Confidence Software Reuse in Large Systems : 10th International Conference on Software Reuse, ICSR 2008, Beijing, China, May 25-29, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Software Reuse, ICSR 2008, held in ...

اقرأ المزيد
978-3-540-87357-0
IP Operations and Management : 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...

اقرأ المزيد
978-0-387-77393-3
ITIL® Version 3 at a Glance : Information Quick Reference

The desk reference’s unique graphical approach will take otherwise complex textual descriptions and make the information ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-540-79104-1
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

اقرأ المزيد
978-3-540-79966-5
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-79499-8
Information Security and Cryptology : Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the Third SKLOIS (State Key Laboratory of Information ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-79588-9
Making Globally Distributed Software Development a Success Story : International Conference on Software Process, ICSP 2008 Leipzig, Germany, May 10-11, 2008 Proceedings

This volume contains papers presented at the International Conference on Software Process (ICSP 2008) held in Leipzig, Germany, ...

اقرأ المزيد
عدد الكتب: 21 - 40 /86