الكتب الالكترونية

عدد الكتب: 141 - 157 /157
978-3-540-30598-9
Security in Communication Networks

The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...

اقرأ المزيد
978-3-319-60774-0
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

اقرأ المزيد
978-3-540-85893-5
Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings

This book deals with the various issues related to the use of small electronic tokens in the process of human-machine interactions. ...

اقرأ المزيد
9780691223087
Spies, Lies, And Algorithms: The History And Future Of American Intelligence / Amy B. Zegart

Spying has never been more ubiquitous—or less understood. The world is drowning in spy movies, TV shows, and novels, but ...

اقرأ المزيد
978-3-030-64881-7
Testing Software and Systems : 32nd IFIP WG 6.1 International Conference, ICTSS 2020, Naples, Italy, December 9–11, 2020, Proceedings

This book constitutes the refereed proceedings of the 32nd IFIP WG 6.1 International Conference on Testing Software and Systems, ...

اقرأ المزيد
978-3-540-78731-0
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

اقرأ المزيد
978-3-030-64375-1
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-030-64378-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-030-64381-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

اقرأ المزيد
978-3-540-32040-1
Trust Management (vol. # 3477)

The purpose of the iTrust working group is to provide a forum for cro- disciplinary investigation of the applications of ...

اقرأ المزيد
978-3-030-58986-8
Trust, Privacy and Security in Digital Business

This book constitutes the refereed proceedings of the 17th International Conference on Trust, Privacy and Security in Digital ...

اقرأ المزيد
978-1-4842-7821-5
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

اقرأ المزيد
978-3-662-62157-8
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

اقرأ المزيد
978-3-030-59016-1
Wireless Algorithms, Systems, and Applications

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...

اقرأ المزيد
978-3-030-59019-2
Wireless Algorithms, Systems, and Applications

The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, ...

اقرأ المزيد
978-0-387-33112-6
Wireless Network Security

This timely volume, Wireless Network Security, provides broad coverage of wireless security issues including cryptographic ...

اقرأ المزيد
978-0-387-49592-7
Wireless Sensor Networks and Applications

Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and ...

اقرأ المزيد
عدد الكتب: 141 - 157 /157