الكتب الالكترونية

عدد الكتب: 721 - 740 /2772
978-0-387-75865-7
Cyanobacterial Harmful Algal Blooms: State of the Science and Research Needs

Humans can be exposed to cyanobacterial toxins by drinking water that contains the toxins, swimming in water that contains ...

اقرأ المزيد
978-981-13-6621-5
Cyber Security ; 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...

اقرأ المزيد
NoIMG
Cybersecurity in Poland : Legal Aspects

This book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...

اقرأ المزيد
978-0-387-36081-2
Cycle Representations of Markov Processes

This book provides new insight into Markovian dependence via the cycle decompositions. It presents a systematic account of ...

اقرأ المزيد
978-0-387-36081-2
Cycle Representations of Markov Processes

This book provides new insight into Markovian dependence via the cycle decompositions. It presents a systematic account of ...

اقرأ المزيد
978-3-540-33069-1
Cyclotomic Fields and Zeta Values

Cyclotomic fields have always occupied a central place in number theory, and the so called "main conjecture" on cyclotomic ...

اقرأ المزيد
978-3-540-33069-1
Cyclotomic Fields and Zeta Values

Cyclotomic fields have always occupied a central place in number theory, and the so called "main conjecture" on cyclotomic ...

اقرأ المزيد
978-88-470-0718-5
Cálculo Científico : com MATLAB e Octave = Scientific Calculus : with MATLAB and Octave

Its objective is to present various numerical methods for solving certain mathematical problems on the computer that cannot ...

اقرأ المزيد
978-0-8176-4523-6
D-Modules, Perverse Sheaves, and Representation Theory

D-modules continues to be an active area of stimulating research in such mathematical areas as algebra, analysis, differential ...

اقرأ المزيد
978-3-540-31390-8
DNA Methylation: Basic Mechanisms

The structural and functional importance of the correct patterns of DNA methylation in all parts of a mammalian genome is ...

اقرأ المزيد
978-0-387-36802-3
DNA Repair and Human Disease

DNA Repair and Human Disease highlights the molecular complexities of a few well-known human hereditary disorders that arise ...

اقرأ المزيد
978-3-030-49618-0
Data Augmented Design

This book offers an essential introduction to a new urban planning and design methodology called Data Augmented Design (DAD) ...

اقرأ المزيد
978-3-540-32548-2
Data Mining

This volume provides a snapshot of the current state of the art in data mining, presenting it both in terms of technical ...

اقرأ المزيد
978-0-387-26351-9
Data Mining and Diagnosing IC Fails

This book brings together a large number of analysis techniques that are suitable for IC fail data, but that are not available ...

اقرأ المزيد
978-1-84628-059-7
Data Mining in Bioinformatics

8. 1. 1 Protein Subcellular Location The life sciences have entered the post-genome era where the focus of biological research ...

اقرأ المزيد
978-3-540-33173-5
Data Quality

Batini and Scannapieco present a comprehensive and systematic introduction to the wide set of issues related to data quality. ...

اقرأ المزيد
978-981-15-5830-6
Data Science and Analytics : 5th International Conference on Recent Developments in Science, Engineering and Technology, REDSET 2019, Gurugram, India, November 15–16, 2019, Revised Selected Papers, Part II

This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...

اقرأ المزيد
978-3-540-36799-4
Data and Applications Security XX

For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...

اقرأ المزيد
978-3-540-73538-0
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

اقرأ المزيد
978-3-540-73538-0
Data and Applications Security XXI

This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...

اقرأ المزيد
عدد الكتب: 721 - 740 /2772