الكتب الالكترونية

عدد الكتب: 41 - 60 /195
978-3-540-44605-7
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
978-0-387-47681-0
Constructal Theory of Social Dynamics

Constructal Theory of Social Dynamics brings together for the first time social scientists and engineers to develop a predictive ...

اقرأ المزيد
978-1-4020-6847-8
Coral Reefs of the USA

This book will therefore be of broad general interest. For the first time, complete scholarly reviews are given for the geology, ...

اقرأ المزيد
9780367515027
Corporate Brand Design : Developing and Managing Brand Identity / Mohammad Mahdi Foroudi, Pantea Foroudi

Corporate Brand Design offers a unique and comprehensive exploration of the relationship between companies, their brand design ...

اقرأ المزيد
978-3-030-57646-2
Critical Questions in STEM Education

This volume is divided into three sections: the first one describes the nature of the component disciplines of STEM. The ...

اقرأ المزيد
978-3-540-79244-4
Cross-border Governance and Sustainable Spatial Development : Mind the Gaps!

Border regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...

اقرأ المزيد
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

اقرأ المزيد
978-3-540-89641-8
Cryptology and Network Security : 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
9783038214793
Daylighting Design Planning Strategies and Best Practice Solutions / Mohamed Boubekri

The primary objective of daylight systems is to make maximum use of daylight for certain building types and climates. The ...

اقرأ المزيد
978-88-470-0784-0
Deduction, Computation, Experiment : Exploring the Effectiveness of Proof

What is a proof for? What is the characteristic use of a proof as a computation, as opposed to its use as an experiment? ...

اقرأ المزيد
978-3-540-71285-5
Differential Equations Driven by Rough Paths

The goal of these notes is to provide a straightforward and self supporting but minimalist account of the key results forming ...

اقرأ المزيد
978-3-540-35999-9
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

اقرأ المزيد
NoIMG
Enhancing Urban Environment by Environmental Upgrading and Restoration

As urban areas keep growing, water infrastructure ages, and the requirements on environmental protection become more rigorous, ...

اقرأ المزيد
NoIMG
Ester Boserup’s Legacy on Sustainability : Orientations for Contemporary Research

The contents are organized in three sections reflecting important focal points of Boserup’s own work: Long-Term Socio-Ecological ...

اقرأ المزيد
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

اقرأ المزيد
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

اقرأ المزيد
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

اقرأ المزيد
978-3-540-31680-0
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

اقرأ المزيد
عدد الكتب: 41 - 60 /195