الكتب الالكترونية

عدد الكتب: 681 - 700 /920
978-3-540-32278-8
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

اقرأ المزيد
978-3-540-49769-1
Progress in Cryptology - INDOCRYPT 2006

This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, ...

اقرأ المزيد
978-3-540-89754-5
Progress in Cryptology - INDOCRYPT 2008 : 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...

اقرأ المزيد
978-3-540-77026-8
Progress in Cryptology – INDOCRYPT 2007

This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, ...

اقرأ المزيد
978-3-540-32066-1
Progress in Cryptology – Mycrypt 2005

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...

اقرأ المزيد
NoIMG
Property protection register ماسة نزار سيروان ؛ أحمد منيف شاهين ؛ حنان محمد عزيز موالدي ؛ محمد أكرم محمد خيري دولاتي ؛ ليث خلدون الحليبي ؛ إشراف د.أبي صندوق

The aim of our project is to prevent the loss of items whether they have a monetary or an emotional value to their owner ...

اقرأ المزيد
978-3-540-88733-1
Provable Security : Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings

This book is organized in topical sections on Encryption, Signature, Analysis, Application of Hash Functions, Universal Composability, ...

اقرأ المزيد
978-3-030-62576-4
Provable and Practical Security

This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...

اقرأ المزيد
978-3-540-46303-0
Provenance and Annotation of Data

This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...

اقرأ المزيد
978-3-030-53697-8
Public Administration in Germany

This book presents a topical, comprehensive and differentiated analysis of Germany’s public administration and reforms. ...

اقرأ المزيد
978-3-540-71677-8
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

اقرأ المزيد
978-3-540-73408-6
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

اقرأ المزيد
978-3-540-31585-8
Public Key Infrastructure (vol. # 3545)

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...

اقرأ المزيد
978-3-540-35152-8
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

اقرأ المزيد
1119850649
Python for Cybersecurity: Using Python for Cyber Offense and Defense / Howard E. Poston

Delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...

اقرأ المزيد
978-0-387-36584-8
Quality Of Protection

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...

اقرأ المزيد
978-3-030-58793-2
Quality of Information and Communications Technology

This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...

اقرأ المزيد
978-3-540-48820-0
Quality of Software Architectures

Although the quality of a system’s software architecture is one of the critical factors in its overall quality, the architecture ...

اقرأ المزيد
978-1-4020-8512-3
Quantum Magnetism

This bookis based on some of the lectures duringthe Paci?c Institute of Theoretical Physics (PITP) summer school on “Quantum ...

اقرأ المزيد
978-3-540-79076-1
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

اقرأ المزيد
عدد الكتب: 681 - 700 /920