الكتب الالكترونية

عدد الكتب: 61 - 80 /315
978-3-540-46368-9
Binary Quadratic Forms : An Algorithmic Approach

This book deals with algorithmic problems concerning binary quadratic forms 2 2 f(X,Y)= aX +bXY +cY with integer coe?cients ...

اقرأ المزيد
978-0-387-27160-6
Brute Force

In the 1960s, it became increasingly clear that more and more information was going to be stored on computers, not on pieces ...

اقرأ المزيد
978-3-540-79992-4
Cellular Automata : 8th International Conference on Cellular Aotomata for Reseach and Industry, ACRI 2008, Yokohama, Japan, September 23-26, 2008. Proceedings

This book constitutes the refereed proceedings of the 8th International Conference on Cellular Automata for Research and ...

اقرأ المزيد
978-1-84800-273-9
Codes: An Introduction to Information Communication and Cryptography

Information is an important feature of the modern world. Mathematical techniques underlie the devices that we use to handle ...

اقرأ المزيد
978-3-540-35482-6
Coding and Cryptography

This volume contains refereed papers devotedtocodingandcrypto graphy.These papers arethe full versionsof a selectionof the ...

اقرأ المزيد
978-0-387-23804-3
Coding for Data and Computer Communications

In a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...

اقرأ المزيد
978-0-387-24486-0
Communications and Multimedia Security (vol. # 175)

Communications and Multimedia Security is an essential reference for both academic and professional researchers in the fields ...

اقرأ المزيد
978-3-540-31978-8
Communications and Multimedia Security (vol. # 3677)

This book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...

اقرأ المزيد
978-3-540-47823-2
Communications and Multimedia Security (vol. # 4237)

Scientists, managers, and politicians all over the world havedesignedandarecurrently implementing systematicapproachesto ...

اقرأ المزيد
978-3-540-28520-5
Complexity Theory and Cryptology

Modern cryptology employs mathematically rigorous concepts and methods from complexity theory. Conversely, current research ...

اقرأ المزيد
978-3-540-74377-4
Computational Intelligence and Security

It covers bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information ...

اقرأ المزيد
978-3-540-74377-4
Computational Intelligence and Security

It covers bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information ...

اقرأ المزيد
978-3-540-31598-8
Computational Intelligence and Security (vol. # 3802)

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...

اقرأ المزيد
978-981-15-9700-8
Computational Intelligence, Cyber Security and Computational Models. Models and Techniques for Intelligent Systems and Automation : 4th International Conference, ICC3 2019, Coimbatore, India, December 19–21, 2019, Revised Selected Papers

This book constitutes the proceedings of the 4th International Conference on Computational Intelligence, Cyber Security, ...

اقرأ المزيد
978-0-387-25228-5
Computer Network Security

As society becomes increasingly dependent on computers and computer networks, computer problems continue to rise in number. ...

اقرأ المزيد
978-3-030-54549-9
Computer Safety, Reliability, and Security

This book constitutes the proceedings of the 39th International Conference on Computer Safety, Reliability and Security, ...

اقرأ المزيد
978-3-540-74510-5
Computer Science – Theory and Applications

This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...

اقرأ المزيد
978-3-540-74510-5
Computer Science – Theory and Applications

This book covers theory track deals with algorithms, protocols, and data structures; complexity and cryptography; formal ...

اقرأ المزيد
978-3-030-50026-9
Computer Science – Theory and Applications : 15th International Computer Science Symposium in Russia, CSR 2020, Yekaterinburg, Russia, June 29 – July 3, 2020, Proceedings

This book constitutes the proceedings of the 15th International Computer Science Symposium in Russia, CSR 2020, held in Yekaterinburg, ...

اقرأ المزيد
978-3-540-74835-9
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

اقرأ المزيد
عدد الكتب: 61 - 80 /315