الكتب الالكترونية

عدد الكتب: 61 - 80 /157
978-1-84628-352-9
EC2ND 2005

This book contains the proceedings of the First European Conference on Computer Network Defence which took place in December ...

اقرأ المزيد
978-3-030-54455-3
Financial Cryptography and Data Security : FC 2020 International Workshops, AsiaUSEC, CoDeFi, VOTING, and WTSC, Kota Kinabalu, Malaysia, February 14, 2020, Revised Selected Papers

This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...

اقرأ المزيد
978-3-540-68136-6
Formal Correctness of Security Protocols

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...

اقرأ المزيد
978-1-84628-341-3
Foundations of Computer Security

Foundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...

اقرأ المزيد
978-3-540-44493-0
Grid Computing Security

In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...

اقرأ المزيد
978-0-387-29845-0
Guide to Wireless Network Security

Guide to Wireless Network Security is an authoritative, clearly presented guide to key foundation topics and technology frameworks ...

اقرأ المزيد
978-3-030-32785-9
How AI Impacts Urban Living and Public Health

This book cover topics such as: e-health technology design; well-being technology; biomedical and health informatics; and ...

اقرأ المزيد
978-3-030-57404-8
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...

اقرأ المزيد
978-3-540-31866-8
Image Analysis and Processing – ICIAP 2005

This volume contains the Proceedings of the 13th International Conference on Image Analysis and Processing (ICIAP 2005), ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-540-30582-8
Information Networking

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...

اقرأ المزيد
978-3-540-48564-3
Information Networking Advances in Data Communications and Wireless Networks

This volume, LNCS 3961, contains the papers selected from those presented at the International Conference on Information ...

اقرأ المزيد
978-3-540-31930-6
Information Security (vol. # 3650)

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...

اقرأ المزيد
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
978-3-540-31979-5
Information Security Practice and Experience (vol. # 3439)

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...

اقرأ المزيد
978-3-540-79966-5
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-3-540-32083-8
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

اقرأ المزيد
عدد الكتب: 61 - 80 /157