الكتب الالكترونية

عدد الكتب: 121 - 129 /129
978-3-030-64381-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-540-32040-1
Trust Management (vol. # 3477)

The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...

اقرأ المزيد
978-3-030-58986-8
Trust, Privacy and Security in Digital Business

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...

اقرأ المزيد
978-1-4842-7821-5
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

اقرأ المزيد
978-3-662-62157-8
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

اقرأ المزيد
978-3-030-59016-1
Wireless Algorithms, Systems, and Applications

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...

اقرأ المزيد
978-3-030-59019-2
Wireless Algorithms, Systems, and Applications

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...

اقرأ المزيد
978-0-387-33112-6
Wireless Network Security

This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic ...

اقرأ المزيد
978-0-387-49592-7
Wireless Sensor Networks and Applications

Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and ...

اقرأ المزيد
عدد الكتب: 121 - 129 /129