الكتب الالكترونية

عدد الكتب: 201 - 220 /920
978-3-540-33691-4
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3956)

This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...

اقرأ المزيد
978-3-030-60816-3
Cooperative Design, Visualization, and Engineering

This book constitutes the proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, ...

اقرأ المزيد
978-3-540-31976-4
Cooperative Design, Visualization, and Engineering (vol. # 3675)

This book constitutes the refereed proceedings of the Second International Conference on Cooperative Design, Visualization, ...

اقرأ المزيد
9780137673629
Core Java Volume I: Fundamentals, 12th ed. / Cay S. Horstmann

The definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...

اقرأ المزيد
978-3-540-76947-7
Countering Counterfeit Trade : Illicit Market Insights, Best-Practice Strategies, and Management Toolbox

The book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...

اقرأ المزيد
NoIMG
Crime detection camera / Adnan Aji , Duha Aljubbeh , Laila Tarabih , Marwan Osta Halabi and Nour Alhuda Zeiter ; Supervised by Raouf Hamdan and Massa Albaali عدنان عامر عاجي ، ضحى الجبة ، ليلى طرابية ، مروان الاسطة حلبي و نور الهدى محمد رضا زعيتر ؛ إشراف رؤوف حمدان و ماسة البعلي

This paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...

اقرأ المزيد
978-3-540-69084-9
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-1-4020-8476-8
Crop Biosecurity

Prevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...

اقرأ المزيد
978-0-387-34189-7
CryptoGraphics

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...

اقرأ المزيد
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-85053-3
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

اقرأ المزيد
978-3-030-34142-8
Cryptography Arithmetic : Algorithms and Hardware Architectures

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...

اقرأ المزيد
9781292158587
Cryptography and Network Security: principles and practices / W. Stallings

Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...

اقرأ المزيد
978-1-4302-0026-0
Cryptography in C and C++

This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second ...

اقرأ المزيد
978-3-030-65411-5
Cryptology and Network Security

This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
عدد الكتب: 201 - 220 /920