الكتب الالكترونية

عدد الكتب: 21 - 40 /66
978-3-540-68380-3
Distributed Computing and Internet Technology (vol. # 4317)

Constitutes the refereed proceedings of the Third International Conference on Distributed Computing and Internet Technology, ...

اقرأ المزيد
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

اقرأ المزيد
978-3-540-77493-8
E-Voting and Identity

Voting and identity have a very delicate relationship. Only a few processes - pendso much on an identity management respecting ...

اقرأ المزيد
978-3-540-31936-8
Foundations of Security Analysis and Design III

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested ...

اقرأ المزيد
978-3-540-74810-6
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-31815-6
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
978-3-540-31979-5
Information Security Practice and Experience (vol. # 3439)

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...

اقرأ المزيد
978-3-540-79104-1
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

اقرأ المزيد
978-3-540-32424-9
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-3-540-72163-5
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

اقرأ المزيد
978-3-540-32422-5
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

اقرأ المزيد
978-3-540-85093-9
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

اقرأ المزيد
978-3-540-49497-3
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

اقرأ المزيد
978-3-540-71549-8
Intelligence and Security Informatics

Intelligence and security informatics (ISI) is concerned with the study of the development and use of advanced information ...

اقرأ المزيد
978-3-540-33362-3
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

اقرأ المزيد
978-0-387-77266-0
Intrusion Detection Systems

Sٍheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion ...

اقرأ المزيد
978-0-387-23399-4
Intrusion Detection and Correlation

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...

اقرأ المزيد
عدد الكتب: 21 - 40 /66