الكتب الالكترونية

عدد الكتب: 81 - 100 /181
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

اقرأ المزيد
978-3-540-77366-5
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

اقرأ المزيد
978-3-540-77366-5
Financial Cryptography and Data Security

This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...

اقرأ المزيد
978-3-540-31680-0
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

اقرأ المزيد
978-3-540-46256-9
Financial Cryptography and Data Security (vol. # 4107)

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...

اقرأ المزيد
978-3-540-85230-8
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

اقرأ المزيد
978-3-540-26989-2
Formal Modelling in Electronic Commerce

Advances in automation for electronic commerce require improved understanding and formalization of the objects, processes, ...

اقرأ المزيد
978-1-4302-0103-8
Foundation ASP.NET for Flash

If you're a reasonably experienced Flash user who has mastered the basics but wants to empower your SWFs, taking them further ...

اقرأ المزيد
978-3-540-32437-9
Frontiers of WWW Research and Development -- APWeb 2006

This book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...

اقرأ المزيد
978-981-15-7865-6
Global History with Chinese Characteristics Autocratic States along the Silk Road in the Decline of the Spanish and Qing Empires 1680-1796

This book examines perceptions and dialogues between China and Europe by analysing strategic geopolitical sites which fostered ...

اقرأ المزيد
978-1-4842-6519-2
Goliath Strikes Back : How Traditional Retailers Are Winning Back Customers from Ecommerce Startups / Peter S. Cohan

Goliath Strikes Back: How Traditional Retailers Are Winning Back Customers from Ecommerce Startups expands on this current ...

اقرأ المزيد
978-3-540-85485-2
Grid Economics and Business Models : 5th International Workshop, GECON 2008, Las Palmas de Gran Canaria, Spain, August 26, 2008. Proceedings

This volume constitutes the refereed proceedings of the 5th International Workshop on Grid Economics and Business Models, ...

اقرأ المزيد
978-1-83953-060-9
Handbook Of Big Data Analytics ; Vol. 2: Applications in ICT, security and business analytics

Big Data analytics is the complex process of examining big data to uncover information such as correlations, hidden patterns, ...

اقرأ المزيد
978-3-540-32117-0
Human Interactive Proofs

Constitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in ...

اقرأ المزيد
9781799876038
Impact of Globalization and Advanced Technologies on Online Business Models / Alex Hou Hong Ng, Mustafa Nourallah

Unravels and provides business managers and scholars with new development in managing the ever-increasing global and advance ...

اقرأ المزيد
978-0-387-26334-2
Impacts and Risk Assessment of Technology for Internet Security

The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled ...

اقرأ المزيد
978-3-540-77020-6
Implementing Semantic Web Services : The SESA Framework

Service-oriented computing has become one of the predominant factors in IT research and development efforts over the last ...

اقرأ المزيد
978-1-84628-489-2
Information Assurance

This updated edition of Information Assurance: Security in the Information Environment was written to help IT managers and ...

اقرأ المزيد
978-3-540-47719-8
Information Security and Privacy

A Few Thoughts on E-Commerce.- New CBC-MAC Forgery Attacks.- Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP ...

اقرأ المزيد
978-3-540-26907-6
Information Sharing on the Semantic Web

The large-scale and almost ubiquitous availability of information has become as much of a curse as it is a blessing. The ...

اقرأ المزيد
عدد الكتب: 81 - 100 /181