الكتب الالكترونية

عدد الكتب: 741 - 760 /966
978-3-540-39725-0
Recent Advances in Intrusion Detection (vol. # 4219)

This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...

اقرأ المزيد
978-3-540-87403-4
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

اقرأ المزيد
978-3-540-73031-6
Requirements Engineering: Foundation for Software Quality

This book constitutes the refereed proceedings of the 13th International Working Conference on Requirements Engineering: ...

اقرأ المزيد
978-1-4020-8924-4
Rescue of Sturgeon Species in the Ural River Basin

Proceedings of the NATO Advanced Research Workshop on Rescue of Sturgeon Species by means of Transboundary Integrated Water ...

اقرأ المزيد
978-3-540-88353-1
Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...

اقرأ المزيد
978-1-4020-8489-8
Resilience of Cities to Terrorist and other Threats

Cities tend to become more crowded, the high rise buildings taller, the traffic nodes more complex. The volume of hazardous ...

اقرأ المزيد
978-3-540-34607-4
Reuse of Off-the-Shelf Components

Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...

اقرأ المزيد
1119812569
Risk Parity: How to Invest for All Market Environments / Alex Shahidi

In Risk Parity: How to Invest for All Market Environments, accomplished investment consultant Alex Shahidi delivers a powerful ...

اقرأ المزيد
978-3-540-89247-2
Runtime Verification : 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers

The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...

اقرأ المزيد
978-3-319-69790-1
Russia's Turn to the East

This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...

اقرأ المزيد
978-1-4020-6662-7
Safeguards in a World of Ambient Intelligence

It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...

اقرأ المزيد
978-3-030-59306-3
Safety and Security in Hotels and Home Sharing

This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...

اقرأ المزيد
978-3-540-31781-4
Satellite Events at the MoDELS 2005 Conference

This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...

اقرأ المزيد
978-3-540-75248-6
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

اقرأ المزيد
978-3-540-31974-0
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

اقرأ المزيد
978-3-540-38987-3
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

اقرأ المزيد
978-3-540-85259-9
Secure Data Management : 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings

This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...

اقرأ المزيد
978-0-387-27696-0
Secure Data Management in Decentralized Systems

New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...

اقرأ المزيد
9780367534103
Secure Data Science : Integrating Cyber Security and Data Science / Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan

Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...

اقرأ المزيد
978-0-387-22971-3
Secure Group Communications Over Data Networks

This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...

اقرأ المزيد
عدد الكتب: 741 - 760 /966