الكتب الالكترونية

عدد الكتب: 141 - 160 /263
978-3-540-73458-1
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

اقرأ المزيد
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-31684-8
Information Security and Privacy (vol. # 3574)

Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...

اقرأ المزيد
978-3-540-35459-8
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

اقرأ المزيد
978-3-540-70500-0
Information Security and Privacy : 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP ...

اقرأ المزيد
978-3-540-72163-5
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

اقرأ المزيد
978-3-540-77086-2
Information Systems Security

This book constitutes the refereed proceedings of the Third International Conference on Information Systems Security, ICISS ...

اقرأ المزيد
978-3-030-65610-2
Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...

اقرأ المزيد
978-3-540-49497-3
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

اقرأ المزيد
978-3-540-88625-9
Information and Communications Security : 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008 Proceedings

This book constitutes the refereed proceedings of the 10th International Conference on Information and Communications Security, ...

اقرأ المزيد
978-0-387-77322-3
Insider Attack and Cyber Security : Beyond the Hacker

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...

اقرأ المزيد
978-3-540-32063-0
Intelligence and Security Informatics (vol. # 3495)

Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...

اقرأ المزيد
978-3-030-84522-3
Intelligent Computing Theories and Application

The ICIC theme unifies the picture of contemporary intelligent computing techniques as an integral concept that highlights ...

اقرأ المزيد
978-981-15-5191-8
International Symposium on Mathematics, Quantum Theory, and Cryptography Proceedings of MQC 2019

This book presents selected papers from International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC), ...

اقرأ المزيد
9781032204925
Introduction to Machine Learning with Applications in Information Security / Mark Stamp

Provides a classroom-tested introduction to a wide variety of machine learning and deep learning algorithms and techniques, ...

اقرأ المزيد
978-0-387-77266-0
Intrusion Detection Systems

Sٍheds new light on defense alert systems against computer and network intrusions. It also covers integrating intrusion ...

اقرأ المزيد
NoIMG
IoT-enabled Smart Healthcare Systems, Services and Applications / Shalli Rani, Maheswar Rajagopal

In IoT-Enabled Smart Healthcare Systems, Services and Applications, an accomplished team of researchers delivers an insightful ...

اقرأ المزيد
1119785804
Machine Learning Approach for Cloud Data Analytics in IoT / Sachi Nandan Mohanty, Jyotir Moy Chatterjee, Monika Mangla, Suneeta Satpathy, Sirisha Potluri

Covers the multidimensional perspective of machine learning through the perspective of cloud computing and Internet of Things ...

اقرأ المزيد
NoIMG
Machine Learning and Knowledge Extraction : 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain Conference, CD-MAKE 2021, Virtual Event, August 17–20, 2021, Proceedings

This book constitutes the refereed proceedings of the 5th IFIP TC 5, TC 12, WG 8.4, WG 8.9, WG 12.9 International Cross-Domain ...

اقرأ المزيد
978-3-030-62223-7
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

اقرأ المزيد
عدد الكتب: 141 - 160 /263