الكتب الالكترونية

عدد الكتب: 61 - 80 /134
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
978-3-540-31979-5
Information Security Practice and Experience (vol. # 3439)

The inaugural Information Security Practice and Experience Conference (ISPEC) was held on April 11–14, 2005, in Singapore. ...

اقرأ المزيد
978-3-540-79966-5
Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks : Second IFIP WG 11.2 International Workshop, WISTP 2008, Seville, Spain, May 13-16, 2008. Proceedings

This volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-3-540-32083-8
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

اقرأ المزيد
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-35459-8
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

اقرأ المزيد
978-3-030-65610-2
Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...

اقرأ المزيد
978-3-030-49443-8
Information Systems Security and Privacy

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...

اقرأ المزيد
978-3-540-77048-0
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

اقرأ المزيد
978-3-540-49497-3
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

اقرأ المزيد
978-3-540-33362-3
Intelligence and Security Informatics (vol. # 3917)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

اقرأ المزيد
NoIMG
Intelligent Network Management and Control: Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio / Badr Benmammar

The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at ...

اقرأ المزيد
978-0-387-23399-4
Intrusion Detection and Correlation

INTRUSION DETECTION AND CORRELATION: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the ...

اقرأ المزيد
978-3-540-31645-9
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

اقرأ المزيد
978-3-030-91585-8
Machine Learning for Cyber Agents : Attack and Defence / Stanislav Abaimov, Maurizio Martellini

The cyber world has been both enhanced and endangered by AI. On the one hand, the performance of many existing security services ...

اقرأ المزيد
978-3-030-62223-7
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

اقرأ المزيد
978-981-15-6318-8
Machine Learning, Image Processing, Network Security and Data Sciences

This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine ...

اقرأ المزيد
978-3-540-77024-4
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

اقرأ المزيد
عدد الكتب: 61 - 80 /134