الكتب الالكترونية

عدد الكتب: 1301 - 1320 /1614
978-981-15-3654-0
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

اقرأ المزيد
978-3-540-77156-2
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

اقرأ المزيد
978-3-540-31836-1
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

اقرأ المزيد
978-3-540-40926-7
Security Protocols (vol. # 3957)

" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...

اقرأ المزيد
978-3-540-85855-3
Security and Cryptography for Networks : 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008. Proceedings

This book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...

اقرأ المزيد
978-3-540-31615-2
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

اقرأ المزيد
978-0-387-33406-6
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

اقرأ المزيد
978-0-387-25660-3
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-0-387-72442-3
Security for Telecommunications Networks

Telecommunications networks are a critical component of the economic and social infrastructures in which we live. Each day, ...

اقرأ المزيد
978-0-387-46781-8
Security for Wireless Sensor Networks

Security for Wireless Sensor Networks discusses fundamental security issues in wireless sensor networks, techniques for the ...

اقرأ المزيد
9780367711412
Security in IoT : The Changing Perspective / Rituparna Chaki, Debdutta Barman Roy

It will be beneficial to any readers interested in security of IoT systems and how to develop a layer-wise security scheme ...

اقرأ المزيد
978-3-540-33377-7
Security in Pervasive Computing (vol. # 3934)

This volume contains the papers presented at the Third International Conference on Security in Pervasive Computing (SPC 2006), ...

اقرأ المزيد
978-3-319-60774-0
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

اقرأ المزيد
978-1-84628-984-2
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

اقرأ المزيد
978-3-540-69861-6
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

اقرأ المزيد
978-3-540-37669-9
Self-Organizing Systems

This book constitutes the refereed proceedings of the First International Workshop on Self-Organizing Systems, IWSOS 2006. ...

اقرأ المزيد
978-3-540-92157-8
Self-Organizing Systems : Third International Workshop, IWSOS 2008, Vienna, Austria, December 10-12, 2008. Proceedings

This book is organized in topical sections on peer-to-peer systems, overlay networks as well as resource and service management.

اقرأ المزيد
1119773296
Self-Service Data Analytics and Governance for Managers / Nathan E. Myers, Gregory Kogan

Motivated by the promise of control and efficiency benefits, the widespread adoption of data analytics tools has created ...

اقرأ المزيد
978-3-540-32013-5
Self-star Properties in Complex Information Systems

Information systems can be complex due to numerous factors including scale, decentralization, heterogeneity, mobility, dynamism, ...

اقرأ المزيد
978-3-540-79454-7
Semantic Grid: Model, Methodology, and Applications

Semantic Grid: Model, Methodology, and Applications introduces to the science, core technologies, and killer applications. ...

اقرأ المزيد
عدد الكتب: 1301 - 1320 /1614