الكتب الالكترونية

عدد الكتب: 41 - 60 /205
978-0-387-23804-3
Coding for Data and Computer Communications

In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...

اقرأ المزيد
978-1-4020-8084-5
Coding for Wireless Channels

Accessible introduction to the theoretical foundations of modern coding theoryIncluding numerous applications to wireless ...

اقرأ المزيد
978-0-387-29026-3
Combinatorial Optimization in Communication Networks

Combinatorial optimization algorithms are used in many applications including the design, management, and operations of communication ...

اقرأ المزيد
978-3-540-71229-9
Compiler Construction

This book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...

اقرأ المزيد
978-3-540-71229-9
Compiler Construction

This book covered Theory and Practice of Software. The sections includes architecture, garbage collection and program analysis, ...

اقرأ المزيد
978-3-540-33051-6
Compiler Construction (vol. # 3923)

ETAPS 2006 was the ninth instance of the European Joint Conferences on Theory and Practice of Software. ETAPS is an annual ...

اقرأ المزيد
978-3-540-78791-4
Compiler Construction : 17th International Conference, CC 2008, Held as Part of the Joint European Conferences on Theory and Practice of Software, ETAPS 2008, Budapest, Hungary, March 29 - April 6, 2008. Proceedings

This book constitutes the proceedings of the 17th International Conference on Compiler Construction, CC 2008. It covers analysis ...

اقرأ المزيد
978-3-540-32000-5
Computer Safety, Reliability, and Security (vol. # 3688)

This book constitutes the refereed proceedings of the 24th International Conference on Computer Safety, Reliability, and ...

اقرأ المزيد
978-0-387-24006-0
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances ...

اقرأ المزيد
978-2-287-28099-3
Computer Viruses: from theory to applications

The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...

اقرأ المزيد
978-3-540-71878-9
Cooperative Bug Isolation

Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...

اقرأ المزيد
978-3-540-71878-9
Cooperative Bug Isolation

Efforts to understand and predict the behavior of software date back to the earliest days of computer programming,over half ...

اقرأ المزيد
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

اقرأ المزيد
978-3-540-85053-3
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

اقرأ المزيد
1119582423
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century, 2nd Edition / Aiden A. Bruen, Mario A. Forcinito, James M. McQuillan

A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...

اقرأ المزيد
978-1-84628-603-2
Data Compression

This book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...

اقرأ المزيد
978-1-84628-603-2
Data Compression

This book of Data Compression provides an all-inclusive, thoroughly updated, and user-friendly reference for the many different ...

اقرأ المزيد
978-3-540-31937-5
Data and Applications Security XIX

Constitutes the refereed proceedings of the 19th Annual Working Conference on Data and Applications Security held in Storrs, ...

اقرأ المزيد
978-3-540-48121-8
Decrypted Secrets

Cryptology, for millennia a "secret science", is rapidly gaining in practical importance for the protection of communication ...

اقرأ المزيد
عدد الكتب: 41 - 60 /205