الكتب الالكترونية

عدد الكتب: 861 - 880 /910
978-3-540-74409-2
Trust, Privacy and Security in Digital Business

This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...

اقرأ المزيد
978-3-030-58986-8
Trust, Privacy and Security in Digital Business

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...

اقرأ المزيد
978-3-540-85735-8
Trust, Privacy and Security in Digital Business : 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...

اقرأ المزيد
978-3-540-31796-8
Trust, Privacy, and Security in Digital Business

“Privacy Enhanced Technology, Methods – Markets – Misuse”. A paper covering his talk is also contained in this book. ...

اقرأ المزيد
978-3-540-68979-9
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

اقرأ المزيد
978-3-540-78663-4
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

اقرأ المزيد
978-3-540-31941-2
UbiComp 2005: Ubiquitous Computing

Constitutes the refereed proceedings of the 7th International Conference on Ubiquitous Computing, UbiComp 2005, held in Japan ...

اقرأ المزيد
978-3-540-39635-2
UbiComp 2006: Ubiquitous Computing

This book constitutes the refereed proceedings of the 8th International Conference on Ubiquitous Computing, UbiComp 2006. ...

اقرأ المزيد
978-3-540-74853-3
UbiComp 2007: Ubiquitous Computing

The Ubiquitous Computing conference series provides the premier forum in which to present original research results in all ...

اقرأ المزيد
978-3-030-79276-3
Ubiquitous Communications and Network Computing

This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...

اقرأ المزيد
978-3-540-31809-5
Ubiquitous Computing Systems (vol. # 3598)

This book is a collection of papers presented at UCS 2004, held on November 8-9 in Tokyo. The submitted papers presented ...

اقرأ المزيد
978-3-540-46289-7
Ubiquitous Computing Systems (vol. # 4239)

This book constitutes the refereed proceedings of the proceedings of the 2006 International Symposium on Ubiquitous Computing ...

اقرأ المزيد
978-3-540-69293-5
Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...

اقرأ المزيد
978-1-4842-7821-5
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

اقرأ المزيد
NoIMG
Understanding Blockchain and Cryptocurrencies : A Primer for Implementing and Developing Blockchain Projects / Akira Summers

Discusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...

اقرأ المزيد
978-0-387-25614-6
Understanding IPv6

Covers the basic materials and up-to-date information to understand IPv6, including site local address often overlooked by ...

اقرأ المزيد
978-0-387-27636-6
Understanding Intrusion Detection through Visualization

This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...

اقرأ المزيد
978-3-662-62157-8
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

اقرأ المزيد
978-3-319-99106-1
United Nations Peace Operations in a Changing Global Order

This volume explores how UN peace operations are adapting to four trends in the changing global order: the rebalancing of ...

اقرأ المزيد
978-0-387-77152-6
Urban Transportation Planning in the United States

The book focuses in-depth at the most significant event in transportation planning--the Federal-Aid Highway Act of 1962; ...

اقرأ المزيد
عدد الكتب: 861 - 880 /910