الكتب الالكترونية

عدد الكتب: 41 - 60 /129
978-3-540-73614-1
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

اقرأ المزيد
978-3-540-36017-9
Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...

اقرأ المزيد
978-3-030-52683-2
Detection of Intrusions and Malware, and Vulnerability Assessment : 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability ...

اقرأ المزيد
978-3-540-74986-8
Developments in Telecommunications : With a Focus on SS7 Network Reliability

This book summarizes important developments in telecommunications, including SS7 over IP, with a focus on SS7 network reliability.

اقرأ المزيد
978-3-540-70760-8
E-Business and Telecommunication Networks :Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers

This book constitutes the best papers of the Third International Conference on E-business and Telecommunication Networks, ...

اقرأ المزيد
978-3-540-75993-5
E-business and Telecommunication Networks

This book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...

اقرأ المزيد
978-3-540-75993-5
E-business and Telecommunication Networks

This book contains fields of e-business and telecommunication networks, including aspects related to security, wireless systems, ...

اقرأ المزيد
978-1-84628-352-9
EC2ND 2005

This book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...

اقرأ المزيد
978-3-030-54455-3
Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers

This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...

اقرأ المزيد
978-3-540-68136-6
Formal Correctness of Security Protocols

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...

اقرأ المزيد
978-1-84628-341-3
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

اقرأ المزيد
978-3-540-44493-0
Grid Computing Security

In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...

اقرأ المزيد
978-0-387-29845-0
Guide to Wireless Network Security

Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...

اقرأ المزيد
978-3-030-32785-9
How AI Impacts Urban Living and Public Health

This book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...

اقرأ المزيد
978-3-030-57404-8
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...

اقرأ المزيد
978-3-540-30582-8
Information Networking

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...

اقرأ المزيد
978-3-540-31930-6
Information Security (vol. # 3650)

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
978-3-540-31979-5
Information Security Practice and Experience (vol. # 3439)

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...

اقرأ المزيد
عدد الكتب: 41 - 60 /129