الكتب الالكترونية

عدد الكتب: 581 - 600 /966
978-981-15-6318-8
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

اقرأ المزيد
978-0-387-44599-1
Malware Detection

Malware Detection, based on the Special ARO/DHS Workshop on Malware Detection at Rosslyn, VA, in 2005, captures the state ...

اقرأ المزيد
978-1-4020-3710-8
Manage IT!

Discusses the IT management tasks and the objects involved. This book outlines traditional IT management; deals with controlling ...

اقرأ المزيد
978-1-4020-6385-5
Managing Critical Infrastructure Risks

At the beginning of each year, there is a deluge of top-10 lists on just about every subject you can imagine. A top-10 list ...

اقرأ المزيد
978-0-387-24230-9
Managing Cyber Threats

This book brings together the latest techniques for managing cyber threats, developed by some of the world’s leading experts ...

اقرأ المزيد
978-3-540-28104-7
Managing Information Systems Security and Privacy

The book deals with the management of information systems security and privacy, based on a model that covers technological, ...

اقرأ المزيد
978-3-540-87353-2
Managing Large-Scale Service Deployment : 19th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

This volume of the Lecture Notes in Computer Science series contains all papers accepted for presentation at the 19th IFIP/IEEE ...

اقرأ المزيد
978-3-540-75476-3
Managing Next Generation Networks and Services

The 48 revised full papers and 30 revised short papers cover management of distributed networks, network configuration and ...

اقرأ المزيد
NoIMG
Managing Risk and Information Security : Protect to Enable

This edition discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes ...

اقرأ المزيد
978-1-4842-1455-8
Managing Risk and Information Security : Protect to Enable

Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on ...

اقرأ المزيد
1119599326
Market Momentum: Theory and Practice / Stephen Satchell, Andrew Grant

Market Momentum: It examines the behavioral and statistical causes of market momentum while also exploring the practical ...

اقرأ المزيد
978-3-540-32254-2
Mechanizing Mathematical Reasoning

By presenting state-of-the-art results in logical reasoning and formal methods in the context of artificial intelligence ...

اقرأ المزيد
NoIMG
Messages security application / Bilal Al-Hamwia ; Kinan Al-Awa ; Rama Al-Hamwi ; Shiraz Naji ; Abd Al-Hadi Nofal

The rapid development of communication technology, is bringing many technological conveniences with it and simplifying our ...

اقرأ المزيد
978-1-4020-6875-1
Methods and Techniques for Cleaning-up Contaminated Sites

This publication is meant to foster links between groups facing challenges cleaning up contaminated sites through presentations ...

اقرأ المزيد
NoIMG
Mid-Infrared Coherent Sources and Applications

Coherent sources of mid-infrared (mid-IR) radiation are of great interest for a wide range of scienti?c and technological ...

اقرأ المزيد
978-3-030-51245-3
Migration and Social Protection in Europe and Beyond (Volume 2) Comparing Consular Services and Diaspora Policies

This second book in a series of three volumes examines the repertoire of policies and programmes led by EU Member States ...

اقرأ المزيد
978-3-540-77024-4
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

اقرأ المزيد
978-3-540-49933-6
Mobile Ad-hoc and Sensor Networks (vol. # 4325)

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...

اقرأ المزيد
NoIMG
Mobile Forensics – The File Format Handbook : Common File Formats and File Systems Used in Mobile Devices

This book summarizes knowledge about several file systems and file formats commonly used in mobile devices. In addition to ...

اقرأ المزيد
978-3-030-62205-3
Mobile Wireless Middleware, Operating Systems and Applications

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...

اقرأ المزيد
عدد الكتب: 581 - 600 /966