الكتب الالكترونية

عدد الكتب: 81 - 93 /93
NoIMG
Secure Mobile Ad-hoc Networks and Sensors

This book constitutes the thoroughly refereed post-proceedings of the First International Workshop on Secure Mobile Ad-hoc ...

اقرأ المزيد
978-3-540-40926-7
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

اقرأ المزيد
978-3-540-33109-4
Selected Areas in Cryptography (vol. # 3897)

This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...

اقرأ المزيد
978-3-540-74462-7
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

اقرأ المزيد
978-3-540-77360-3
Selected Areas in Cryptography ; 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...

اقرأ المزيد
978-3-540-33312-8
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

اقرأ المزيد
1119805465
The Art of Attack: Attacker Mindset for Security Professionals / Maxie Reynolds

Untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...

اقرأ المزيد
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

اقرأ المزيد
978-3-540-49072-2
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

اقرأ المزيد
978-3-540-73092-7
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

اقرأ المزيد
978-3-540-69019-1
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

اقرأ المزيد
978-3-030-67712-1
Trauma and Resilience Among Displaced Populations A Sociocultural Exploration

This book provides an enriched understanding of historical, collective, cultural, and identity-related trauma, emphasising ...

اقرأ المزيد
978-3-540-71789-8
Ubiquitous Convergence Technology

Ubiquitous computing is already with us and is changing our lifestyle, way of thinking and quality of life. Everyday objects ...

اقرأ المزيد
عدد الكتب: 81 - 93 /93