الكتب الالكترونية

عدد الكتب: 61 - 80 /129
978-3-540-79966-5
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-3-540-32083-8
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

اقرأ المزيد
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-030-65610-2
Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...

اقرأ المزيد
978-3-030-49443-8
Information Systems Security and Privacy

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...

اقرأ المزيد
978-3-540-77048-0
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

اقرأ المزيد
978-3-540-49497-3
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

اقرأ المزيد
978-3-540-33362-3
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

اقرأ المزيد
NoIMG
Intelligent Network Management and Control: Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio / Badr Benmammar

The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...

اقرأ المزيد
978-0-387-23399-4
Intrusion Detection and Correlation

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...

اقرأ المزيد
978-3-540-31645-9
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

اقرأ المزيد
978-3-030-91585-8
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

اقرأ المزيد
978-3-030-62223-7
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

اقرأ المزيد
978-981-15-6318-8
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

اقرأ المزيد
978-3-540-77024-4
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

اقرأ المزيد
978-3-540-49933-6
Mobile Ad-hoc and Sensor Networks (vol. # 4325)

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...

اقرأ المزيد
978-0-387-71058-7
Mobile and Wireless Network Security and Privacy

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...

اقرأ المزيد
NoIMG
Modern Socio-Technical Perspectives on Privacy

This book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...

اقرأ المزيد
978-0-387-47955-2
Network Security Policies and Procedures

This volume introduces the technical issues surrounding security, as well as how security policies are formulated at the ...

اقرأ المزيد
عدد الكتب: 61 - 80 /129