الكتب الالكترونية

عدد الكتب: 441 - 460 /608
978-1-4302-0556-2
Practical DWR 2 Projects

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to ...

اقرأ المزيد
978-0-387-29844-3
Practical Internet Security

Practical Internet Security, a professional book, reveals how the Internet is paving the way for secure communications within ...

اقرأ المزيد
978-0-387-28058-5
Practical Pathology Informatics

Practical Pathology Informatics introduces and demystifies a variety of topics in the broad discipline of pathology informatics ...

اقرأ المزيد
9781591406372
Practicing E-government Electronic Commerce: The Strategic Perspective / Mehdi khosrow , Richard T. Watson

Covers topics in e-government, discussing e-government's present shortcomings while exploring a renewed understanding of ...

اقرأ المزيد
978-3-540-77541-6
Principles of Protocol Design

Introduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...

اقرأ المزيد
978-3-319-89722-6
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

اقرأ المزيد
978-3-540-75551-7
Privacy Enhancing Technologies

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...

اقرأ المزيد
978-3-540-31960-3
Privacy Enhancing Technologies (vol. # 3424)

Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...

اقرأ المزيد
978-3-540-78478-4
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

اقرأ المزيد
978-0-387-70992-5
Privacy-Preserving Data Mining:Models and Algorithms

Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...

اقرأ المزيد
978-1-4302-0183-0
Pro Ajax and the .NET 2.0 Platform

There are a few class libraries recently distributed that open the Ajax door to the .NET Framework 2.0. This book examines ...

اقرأ المزيد
978-1-4302-0128-1
Pro JSF and Ajax

Pro JSF and Ajax shows you how to leverage the full potential of JavaServer Faces (JSF) and Ajax. This is not an entry-level ...

اقرأ المزيد
978-1-4302-0249-3
Pro LCS

Pro LCS: Live Communications Server Administration will guide you on how to best leverage Microsofts Live Communications ...

اقرأ المزيد
9780323068888
Problem Solving in Endodontics : Prevention, Identification and Management / James L. Gutmann & Paul E. Lovdahl

Offers updated techniques and an evidence-based approach to the most common procedures performed at chairside. Ideal for ...

اقرأ المزيد
978-3-030-98578-3
Product Lifecycle Management (Volume 1) : 21st Century Paradigm for Product Realisation / John Stark

Describes the relationships of PLM with the Internet of Things, Industry 4.0, Digital Twins and Digital Threads. “Product ...

اقرأ المزيد
978-3-030-51938-4
Progress in Cryptology - AFRICACRYPT 2020 : 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings

This book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...

اقرأ المزيد
978-3-540-78849-2
Progress in WWW Research and Development : 10th Asia-Pacific Web Conference, APWeb 2008, Shenyang, China, April 26-28, 2008. Proceedings

This book is organized in topical sections on data mining and knowledge discovery, wireless, sensor networks and grid, XML ...

اقرأ المزيد
978-3-540-47828-7
Protocols for High Speed Networks

This workshop on “Protocols for High-Speed Networks” is the seventh in a s- cessful series of international workshops, ...

اقرأ المزيد
978-3-540-89965-5
Provenance and Annotation of Data and Processes : Second International Provenance and Annotation Workshop, IPAW 2008, Salt Lake City, UT, USA, June 17-18, 2008. Revised Selected Papers

This book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...

اقرأ المزيد
978-3-540-35152-8
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

اقرأ المزيد
عدد الكتب: 441 - 460 /608