Includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction ...
اقرأ المزيدA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
اقرأ المزيدConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 7th International Conference on Cryptology and Network Security, CANS ...
اقرأ المزيدConstitutes a valuable, concise and up-to-date guide for the materials and life science community interested in cellulose ...
اقرأ المزيدThe chapters selected for this book consist of studies in which culture has been either the object, or the structuring principle ...
اقرأ المزيدThis volume brings together diverse contributions from leading archaeologists and paleoanthropologists, covering various ...
اقرأ المزيدThis book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
اقرأ المزيدThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
اقرأ المزيدThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
اقرأ المزيدThe development of product innovations is permanently challenged by the customers’ rapidly evolving demand for new products ...
اقرأ المزيدJanine Frauendorf analyzes how customer processes can be used to optimize the overall service process. In this context, the ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
اقرأ المزيدPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
اقرأ المزيدFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
اقرأ المزيدThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
اقرأ المزيدIn this concise yet comprehensive textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems ...
اقرأ المزيدThis monograph, divided into four parts, presents a comprehensive treatment and systematic examination of cycle spaces of ...
اقرأ المزيدThis monograph, divided into four parts, presents a comprehensive treatment and systematic examination of cycle spaces of ...
اقرأ المزيد