الكتب الالكترونية

عدد الكتب: 21 - 40 /129
978-981-15-9700-8
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...

اقرأ المزيد
978-0-387-25228-5
Computer Network Security

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...

اقرأ المزيد
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

اقرأ المزيد
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

اقرأ المزيد
978-3-540-31998-6
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

اقرأ المزيد
978-3-540-31981-8
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-030-65411-5
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-540-32298-6
Cryptology and Network Security (vol. # 3810)

Constitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...

اقرأ المزيد
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-981-33-4922-3
Cyber Security 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers

This book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...

اقرأ المزيد
NoIMG
Cyber Security : 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers

This book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...

اقرأ المزيد
NoIMG
Cybersecurity of Digital Service Chains : Challenges, Methodologies, and Tools

This book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...

اقرأ المزيد
978-3-030-49669-2
Data and Applications Security and Privacy XXXIV : 34th Annual IFIP WG 11.3 Conference, DBSec 2020, Regensburg, Germany, June 25–26, 2020, Proceedings

This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...

اقرأ المزيد
978-3-030-59028-4
Database and Expert Systems Applications

This volume constitutes the refereed proceedings of the three workshops held at the 31st International Conference on Database ...

اقرأ المزيد
978-3-540-73614-1
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

اقرأ المزيد
عدد الكتب: 21 - 40 /129