الكتب الالكترونية

عدد الكتب: 881 - 900 /966
978-3-540-27367-7
The Practical Real-Time Enterprise

A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...

اقرأ المزيد
NoIMG
The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value

The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...

اقرأ المزيد
978-3-030-42148-9
The Role of Smallholder Farms in Food and Nutrition Security

This book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...

اقرأ المزيد
978-1-84628-806-7
The Safety of Systems

The papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...

اقرأ المزيد
978-0-387-48531-7
The Semantic Web : Real-World Applications from Industry

It offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...

اقرأ المزيد
978-3-540-31547-6
The Semantic Web: Research and Applications (vol. # 3532)

The vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...

اقرأ المزيد
978-1-4020-8544-4
The Socio-Economic Causes and Consequences of Desertification in Central Asia

This book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...

اقرأ المزيد
NoIMG
The effect of financial performance on the dividend distribution for the listed corporations in Damascus Securities Exchange (Applied Study on Syrian listed telecom companies Mtn and syriatel) مروى ياسر بردان ؛ شحاده الياس نجمه ؛ إشراف د. كنان نده

This study mainly deals with the impact of financial performance on the dividend distribution of the two Syrian telecom companies, ...

اقرأ المزيد
978-3-030-64375-1
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-030-64378-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-030-64381-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-540-30576-7
Theory of Cryptography (vol. # 3378)

This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...

اقرأ المزيد
978-3-540-78524-8
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

اقرأ المزيد
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

اقرأ المزيد
978-3-319-89960-2
Tools and Algorithms for the Construction and Analysis of Systems

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...

اقرأ المزيد
NoIMG
Tools and Algorithms for the Construction and Analysis of Systems : 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part I

This book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...

اقرأ المزيد
NoIMG
Tools and Algorithms for the Construction and Analysis of Systems : 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part II

This book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...

اقرأ المزيد
978-3-540-79263-5
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

اقرأ المزيد
978-3-540-30574-3
Topics in Cryptology -- CT-RSA 2005

This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...

اقرأ المزيد
978-3-540-32648-9
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

اقرأ المزيد
عدد الكتب: 881 - 900 /966