الكتب الالكترونية

عدد الكتب: 41 - 60 /263
978-981-15-9700-8
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...

اقرأ المزيد
978-3-540-34071-3
Computational Science and Its Applications - ICCSA 2006 (vol. # 3980)

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...

اقرأ المزيد
978-3-540-34074-4
Computational Science and Its Applications - ICCSA 2006 (vol. # 3981)

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...

اقرأ المزيد
978-3-540-34076-8
Computational Science and Its Applications - ICCSA 2006 (vol. # 3982)

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...

اقرأ المزيد
978-3-540-34078-2
Computational Science and Its Applications - ICCSA 2006 (vol. # 3983)

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...

اقرأ المزيد
978-3-540-34080-5
Computational Science and Its Applications - ICCSA 2006 (vol. # 3984)

This ?ve-volume set was compiled following the 2006 International Conference on Computational Science and its Applications, ...

اقرأ المزيد
978-3-030-53288-8
Computer Aided Verification 32nd International Conference, CAV 2020, Los Angeles, CA, USA, July 21–24, 2020, Proceedings, Part I

The two-volume set LNCS 12224 and 12225 constitutes the refereed proceedings of the 32st International Conference on Computer ...

اقرأ المزيد
978-3-319-96145-3
Computer Aided Verification

This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...

اقرأ المزيد
978-3-319-96142-2
Computer Aided Verification

This open access two-volume set LNCS 10980 and 10981 constitutes the refereed proceedings of the 30th International Conference ...

اقرأ المزيد
978-3-030-25540-4
Computer Aided Verification ; 31st International Conference, CAV 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part I

This volume presented automata and timed systems; security and hyperproperties; synthesis; model checking; cyber-physical ...

اقرأ المزيد
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

اقرأ المزيد
978-3-540-73986-9
Computer Network Security

This volume focus on mathematical aspects of information and computer network security addressing the ever-increasing demands ...

اقرأ المزيد
978-3-540-31998-6
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

اقرأ المزيد
978-3-030-54549-9
Computer Safety, Reliability, and Security

This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...

اقرأ المزيد
978-3-540-87698-4
Computer Safety, Reliability, and Security : 27th International Conference, SAFECOMP 2008 Newcastle upon Tyne, UK, September 22-25, 2008 Proceedings

This book constitutes the refereed proceedings of the 27th International Conference on Computer Safety, Reliability, and ...

اقرأ المزيد
978-3-540-31981-8
Computer Security - ESORICS 2005

These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
978-3-030-76776-1
Computing Science, Communication and Security

This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...

اقرأ المزيد
978-3-030-60816-3
Cooperative Design, Visualization, and Engineering

This book constitutes the proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, ...

اقرأ المزيد
عدد الكتب: 41 - 60 /263