الكتب الالكترونية

عدد الكتب: 821 - 840 /910
978-3-030-57582-3
The Illegal Trade of Medicines on Social Media

evaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, ...

اقرأ المزيد
NoIMG
The Impact of Announcements on Stock Return at Damascus Securities Exchange: An Empirical Study جيسيكا الخوري ؛ مايا دخيل ؛ مايا حتاحت ؛ سلمى الكاتب ؛ إشراف د. سليمان موصللي

Announcements represent an important source of information to investors at stock exchanges and they are the center of the ...

اقرأ المزيد
NoIMG
The InfoSec Handbook : An Introduction to Information Security

The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed ...

اقرأ المزيد
978-0-387-31168-5
The Information Society: Emerging Landscapes

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

اقرأ المزيد
978-0-387-72381-5
The Information Society: Innovation, Legitimacy, Ethics and Democracy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-3-540-78731-0
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

اقرأ المزيد
978-0-387-48907-0
The Morality of Business

That business is benevolent, positive, and honorable might seem a difficult argument given the hostility among intellectuals, ...

اقرأ المزيد
978-3-030-28683-5
The Potato Crop Its Agricultural, Nutritional and Social Contribution to Humankind

This book provides a fresh, updated and science-based perspective on the current status and prospects of the diverse array ...

اقرأ المزيد
978-3-540-27367-7
The Practical Real-Time Enterprise

A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...

اقرأ المزيد
NoIMG
The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value

The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...

اقرأ المزيد
978-3-030-42148-9
The Role of Smallholder Farms in Food and Nutrition Security

This book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...

اقرأ المزيد
978-1-84628-806-7
The Safety of Systems

The papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...

اقرأ المزيد
978-0-387-48531-7
The Semantic Web : Real-World Applications from Industry

It offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...

اقرأ المزيد
978-3-540-31547-6
The Semantic Web: Research and Applications (vol. # 3532)

The vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...

اقرأ المزيد
978-1-4020-8544-4
The Socio-Economic Causes and Consequences of Desertification in Central Asia

This book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...

اقرأ المزيد
978-3-030-64375-1
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-030-64378-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-030-64381-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-540-78524-8
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

اقرأ المزيد
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

اقرأ المزيد
عدد الكتب: 821 - 840 /910