الكتب الالكترونية

عدد الكتب: 381 - 400 /1614
978-3-540-38570-7
Cooperative Information Agents X

This book constitutes the refereed proceedings of the 10th International Workshop on Cooperative Information Agents, CIA ...

اقرأ المزيد
978-3-540-75119-9
Cooperative Information Agents XI

In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...

اقرأ المزيد
978-3-540-75119-9
Cooperative Information Agents XI

In today’s world of ubiquitously connected heterogeneous information systems and computing devices, the intelligent coordination ...

اقرأ المزيد
978-3-540-85834-8
Cooperative Information Agents XII : 12th International Workshop, CIA 2008, Prague, Czech Republic, September 10-12, 2008. Proceedings

This book constitutes the refereed proceedings of the 12th International Workshop on Cooperative Information Agents, CIA ...

اقرأ المزيد
978-1-4020-4075-7
Coordinated Multiuser Communications

Many communications systems, such as cellular mobile radio and wireless local area networks, are subject to multiple-access ...

اقرأ المزيد
978-3-540-30787-7
Corporate Performance Management

Corporate Performance Management (CPM) is a basic approach which examines the relationship between corporate performance ...

اقرأ المزيد
978-3-8349-9699-2
Cost Accounting for Shared IT Infrastructures

Distributed client/server architectures are the technological backbone of today’s data centres. A usage-based allocation ...

اقرأ المزيد
978-3-540-76947-7
Countering Counterfeit Trade : Illicit Market Insights, Best-Practice Strategies, and Management Toolbox

The book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...

اقرأ المزيد
978-3-540-69084-9
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-2-287-73070-2
Critique de la valeur fondamentale

This work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...

اقرأ المزيد
978-0-387-48742-7
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

اقرأ المزيد
9781398600683
Crypto Wars : Faked Deaths, Missing Billions and Industry Disruption / Erica Stanford

Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-85053-3
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

اقرأ المزيد
1119582423
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

اقرأ المزيد
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

اقرأ المزيد
978-3-540-76969-9
Cryptology and Network Security

This book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...

اقرأ المزيد
عدد الكتب: 381 - 400 /1614