الكتب الالكترونية

عدد الكتب: 41 - 60 /70
978-3-540-49244-3
Introduction to Cryptography

In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital ...

اقرأ المزيد
9781032204925
Introduction to Machine Learning with Applications in Information Security / Mark Stamp

Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...

اقرأ المزيد
978-3-030-91585-8
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

اقرأ المزيد
NoIMG
Managing Risk and Information Security : Protect to Enable

This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...

اقرأ المزيد
978-1-4842-1455-8
Managing Risk and Information Security : Protect to Enable

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...

اقرأ المزيد
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

اقرأ المزيد
978-981-15-8711-5
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

اقرأ المزيد
978-3-540-46480-8
Neural Information Processing (vol. # 4232)

This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...

اقرأ المزيد
978-3-540-46482-2
Neural Information Processing (vol. # 4233)

The three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...

اقرأ المزيد
978-3-540-46485-3
Neural Information Processing (vol. # 4234)

This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...

اقرأ المزيد
978-0-387-72367-9
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-0-387-25096-0
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

اقرأ المزيد
978-0-387-76450-4
Peer-to-Peer Video

Peer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...

اقرأ المزيد
978-0-387-09699-5
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-3-540-78172-1
Product Lifecycle Management

The significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...

اقرأ المزيد
978-3-540-30556-9
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

اقرأ المزيد
978-3-540-32278-8
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

اقرأ المزيد
978-0-387-36584-8
Quality Of Protection

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...

اقرأ المزيد
978-981-15-3654-0
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

اقرأ المزيد
978-3-540-77156-2
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

اقرأ المزيد
عدد الكتب: 41 - 60 /70