الكتب الالكترونية

عدد الكتب: 121 - 140 /263
978-3-540-74810-6
Foundations of Security Analysis and Design IV

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International ...

اقرأ المزيد
978-3-030-63924-2
Future Data and Security Engineering : 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Proceedings

This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...

اقرأ المزيد
NoIMG
Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications : 7th International Conference, FDSE 2020, Quy Nhon, Vietnam, November 25–27, 2020, Proceedings

This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, ...

اقرأ المزيد
978-3-7643-8827-0
Group-based Cryptography

This book is about relations between three different areas of mathematics and theoretical computer science: combinatorial ...

اقرأ المزيد
978-3-030-57404-8
Human Aspects of Information Security and Assurance : 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings

This book constitutes the proceedings of the 14th IFIP WG 11.12 International Symposium on Human Aspects of Information Security ...

اقرأ المزيد
978-3-8348-9418-2
ISSE/SECURE 2007 Securing Electronic Business Processes

This book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...

اقرأ المزيد
978-0-387-23403-8
Image and Video Encryption

Image and Video Encryption provides a unified overview of techniques for encryption of images and video data. This ranges ...

اقرأ المزيد
978-981-13-8289-5
Improving Image Quality in Visual Cryptography

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with ...

اقرأ المزيد
NoIMG
Increasing the security and reliability of e-health system using blockchain technology / Yara Saab ; Sham Al-Boukaee ; Salwan Arar

The Blockchain technology is the buzzword of the year, and as this new technology slowly matured, it seems clear that from ...

اقرأ المزيد
978-1-84628-489-2
Information Assurance

This updated edition of Information Assurance: Security in the Information Environment was written to help IT managers and ...

اقرأ المزيد
978-3-540-77370-2
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

اقرأ المزيد
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

اقرأ المزيد
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

اقرأ المزيد
978-3-540-75496-1
Information Security

The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...

اقرأ المزيد
978-3-540-31930-6
Information Security (vol. # 3650)

This volume contains the proceedings of the 8th International Information - curity Conference (ISC 2005), which took place ...

اقرأ المزيد
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-31815-6
Information Security Applications (vol. # 3325)

The 5th International Workshop on Information Security Applications (WISA 2004) was held in Jeju Island, Korea during August ...

اقرأ المزيد
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-32424-9
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

اقرأ المزيد
عدد الكتب: 121 - 140 /263