الكتب الالكترونية

عدد الكتب: 281 - 300 /660
978-3-540-77535-5
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-79966-5
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-32424-9
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-3-540-32083-8
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

اقرأ المزيد
978-3-540-73458-1
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

اقرأ المزيد
978-3-540-31684-8
Information Security and Privacy (vol. # 3574)

Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...

اقرأ المزيد
978-3-540-35459-8
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-85093-9
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

اقرأ المزيد
978-3-540-32099-9
Information and Communications Security (vol. # 3783)

The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. ...

اقرأ المزيد
978-3-540-49497-3
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

اقرأ المزيد
978-3-540-88625-9
Information and Communications Security : 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...

اقرأ المزيد
978-3-540-27698-2
Information and Its Role in Nature

Infromation and Its Role in Nature presents an in-depth interdisciplinary discussion of the concept of information and its ...

اقرأ المزيد
978-3-030-03633-1
Information—Consciousness—Reality

This book chronicles the rise of a new scientific paradigm offering novel insights into the age-old enigmas of existence. ...

اقرأ المزيد
978-0-387-24578-2
Inner Speech - L2

The purpose of this book is to explore "inner speech" and its connections to second language (L2) learning. reviews the ...

اقرأ المزيد
978-0-387-34253-5
Innovation in Strategic Philanthropy

This book is the result of case studies conducted as part of the International Network on Strategic Philanthropy, which focus ...

اقرأ المزيد
978-3-540-89778-1
Innovations for Requirement Analysis. From Stakeholders Needs to Formal Designs : 14th Monterey Workshop 2007, Monterey, CA, USA, September 10-13, 2007. Revised Selected Papers

This book presents the thoroughly refereed and revised proceedings of the 14th Monterey workshop, held in Monterey, CA, USA, ...

اقرأ المزيد
عدد الكتب: 281 - 300 /660