الكتب الالكترونية

عدد الكتب: 41 - 60 /97
978-3-540-36598-3
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

اقرأ المزيد
978-3-540-71039-4
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

اقرأ المزيد
978-1-84628-732-9
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

اقرأ المزيد
978-1-84628-732-9
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

اقرأ المزيد
978-1-84628-732-9
Forensic Computing

In the second edition of this very successful book, Tony Sammes and Brian Jenkinson show how information held in computer ...

اقرأ المزيد
978-1-84628-341-3
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

اقرأ المزيد
978-3-540-92859-1
High Performance Computing for Computational Science - VECPAR 2008 : 8th International Conference, Toulouse, France, June 24-27, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...

اقرأ المزيد
978-1-4842-7799-7
IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and ...

اقرأ المزيد
978-0-387-23403-8
Image and Video Encryption

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...

اقرأ المزيد
978-3-540-77370-2
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

اقرأ المزيد
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

اقرأ المزيد
978-3-540-31481-3
Information Hiding (vol. # 3727)

Constitutes the refereed post-proceedings of the 7th International Workshop on Information Hiding, IH 2005, held in Barcelona, ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33355-5
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

اقرأ المزيد
978-3-540-76788-6
Information Security and Cryptology - ICISC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...

اقرأ المزيد
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-77086-2
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-540-32422-5
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

اقرأ المزيد
عدد الكتب: 41 - 60 /97