الكتب الالكترونية

عدد الكتب: 61 - 80 /106
978-1-4302-0377-3
Foundations of Security

Foundations of Security: What Every Programmer Needs to Know teaches new and current software professionals state-of-the-art ...

اقرأ المزيد
1284220737
Fundamentals of Information Systems Security ; Fourth Edition / David Kim; Michael G. Solomon

Provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. ...

اقرأ المزيد
NoIMG
Fundamentals of information systems security ; Third edition / David Kim, Michael Solomon

Provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems ...

اقرأ المزيد
978-3-030-57404-8
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...

اقرأ المزيد
978-3-540-75496-1
Information Security

The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...

اقرأ المزيد
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-31815-6
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

اقرأ المزيد
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-030-65610-2
Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...

اقرأ المزيد
978-3-540-89862-7
Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-030-49443-8
Information Systems Security and Privacy

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...

اقرأ المزيد
978-0-387-23399-4
Intrusion Detection and Correlation

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...

اقرأ المزيد
978-1-84628-253-9
Machine Learning and Data Mining for Computer Security

This book presents research conducted in academia and industry on methods and applications of machine learning and data mining ...

اقرأ المزيد
978-3-030-62223-7
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

اقرأ المزيد
978-3-030-62460-6
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

اقرأ المزيد
NoIMG
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

اقرأ المزيد
978-981-15-6318-8
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

اقرأ المزيد
978-3-030-62205-3
Mobile Wireless Middleware, Operating Systems and Applications

This book constitutes the refereed conference proceedings of the 9th International Conference on Mobile Wireless Middleware, ...

اقرأ المزيد
978-3-540-31845-3
Multiparadigm Programming in Mozart

Oz's concurrency model yields simplicity and clarity (because Oz makes it easier to express complex programs with many interacting ...

اقرأ المزيد
عدد الكتب: 61 - 80 /106