الكتب الالكترونية

عدد الكتب: 801 - 820 /966
978-1-84628-984-2
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

اقرأ المزيد
978-3-540-69861-6
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

اقرأ المزيد
9780367652456
Security-first compliance for small businesses / Karen M. Walsh

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...

اقرأ المزيد
978-3-540-30564-4
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

اقرأ المزيد
978-3-540-77360-3
Selected Areas in Cryptography ; 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...

اقرأ المزيد
978-1-84628-692-6
Semantics with Applications: An Appetizer

Semantics will have an important role to play in the future development of software systems and domain specific languages, ...

اقرأ المزيد
978-3-540-32018-0
Service Availability (vol. # 3694)

This book constitutes the thoroughly refereed post-proceedings of the Second International Service Availability Symposium, ...

اقرأ المزيد
978-3-540-68725-2
Service Availability (vol. # 4328)

This book constitutes the thoroughly refereed post-proceedings of the Third International Service Availability Symposium, ...

اقرأ المزيد
978-3-540-68129-8
Service Availability : 5th International Service Availability Symposium, ISAS 2008 Tokyo, Japan, May 19-21, 2008 Proceedings

The book is organized in topical sections on enterprise system dependability, software service availability, service availability ...

اقرأ المزيد
978-3-540-89652-4
Service-Oriented Computing - ICSOC 2008 : 6th International Conference, Sydney, Australia, December 1-5, 2008. Proceedings

The book present original research in the field of service oriented computing, from theoretical and foundational results ...

اقرأ المزيد
978-1-4302-0040-6
SharePoint 2003 Users Guide

Microsoft SharePoint Portal Server 2003 and Windows SharePoint Services address a variety of information-sharing and collaboration ...

اقرأ المزيد
978-3-540-33312-8
Smart Card Research and Advanced Applications

Smart cards are an established security research area with a very unique pr- erty: it integrates numerous sub?elds of IT ...

اقرأ المزيد
978-3-540-85893-5
Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings

This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...

اقرأ المزيد
978-0-387-72198-9
Smart Cards, Tokens, Security and Applications

This book provides a broad overview of the many card systems and solutions that are in practical use today. This state-of-the ...

اقرأ المزيد
978-3-030-49610-4
Smart Grid and Internet of Things

This book constitutes the refereed proceedings of the Third EAI International Conference on Smart Grid and Internet of Things, ...

اقرأ المزيد
978-3-540-69916-3
Smart Homes and Health Telematics : 6th International Conference, ICOST 2008 Ames, IA, USA, June 28-July 2, 2008 Proceedings

The book is organized in topical sections on assistive technology to improve quality of life for older adults and their caregivers; ...

اقرأ المزيد
978-1-4020-8796-7
Smart Materials for Energy, Communications and Security

This book presents the contributions of participants of the Advanced Research Workshop “Smart Materials for Energy, Communications ...

اقرأ المزيد
978-3-030-23343-3
Social Customer Relationship Management : Fundamentals, Applications, Technologies / Rainer Alt , Olaf Reinhold

Presents analytic and operational software tools that offer features for enhancing and streamlining interactions with customers. ...

اقرأ المزيد
978-0-387-84822-8
Social Dimensions Of Information And Communication Technology Policy : Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

اقرأ المزيد
NoIMG
Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication

From the phone phreaks of the 1970s to Anonymous, how how hackers deploy persuasion, helpfulness, manipulation, and deception ...

اقرأ المزيد
عدد الكتب: 801 - 820 /966