الكتب الالكترونية

عدد الكتب: 141 - 160 /253
978-3-540-32269-6
Middleware 2005

Today, middleware is a key part of almost any application. Gone are the days when middleware was only used in the IT industry ...

اقرأ المزيد
978-3-540-77024-4
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

اقرأ المزيد
978-0-387-31166-1
Mobile Information Systems II

This book contains the proceedings of the second IFIP TC8 Working Conference on Mobile Information Systems which was held ...

اقرأ المزيد
978-0-387-71058-7
Mobile and Wireless Network Security and Privacy

Mobile and Wireless Network Security and Privacy analyzes important security and privacy problems in the realms of wireless ...

اقرأ المزيد
978-3-540-75177-9
Mobility, Data Mining and Privacy : Geographic Knowledge Discovery

This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...

اقرأ المزيد
NoIMG
Modern Socio-Technical Perspectives on Privacy

This book provides researchers and professionals with a foundational understanding of online privacy as well as insight into ...

اقرأ المزيد
978-0-387-23198-3
Network Control and Engineering for QOS, Security and Mobility, III

This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality ...

اقرأ المزيد
978-1-84800-153-4
Networked RFID : Systems, Software and Services

The book begins with a quick introduction to RFID basics and then discusses the various elements of the topic, using applications ...

اقرأ المزيد
978-3-540-71641-9
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

اقرأ المزيد
978-0-387-72367-9
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-3-540-68351-3
New Stream Cipher Designs : The eSTREAM Finalists

The goal of eSTREAM was to promote the design of new stream ciphers with a particular emphasis on algorithms that would be ...

اقرأ المزيد
978-0-387-25588-0
Perspectives and Policies on ICT in Society

The intent of this book is to address these issues and to serve as a handbook of IFIP's TC9 "Computers and Society" committee. ...

اقرأ المزيد
NoIMG
Perspectives on Digital Humanism

This book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...

اقرأ المزيد
978-3-540-72037-9
Pervasive Computing

This book constitutes the refereed proceedings of the 5th International Conference on Pervasive Computing, PERVASIVE 2007, ...

اقرأ المزيد
978-3-540-32034-0
Pervasive Computing (vol. # 3468)

WelcometotheproceedingsofPervasive2005,The3rdInternationalConference on Pervasive Computing. We were honored to serve as ...

اقرأ المزيد
978-3-540-33895-6
Pervasive Computing (vol. # 3968)

This book constitutes the refereed proceedings of the 4th International Conference on Pervasive Computing, PERVASIVE 2006, ...

اقرأ المزيد
978-3-540-79576-6
Pervasive Computing : 6th International Conference, Pervasive 2008 Sydney, Australia, May 19-22, 2008 Proceedings

This book constitutes the refereed proceedings of the 6th International Conference on Pervasive Computing, PERVASIVE 2008, ...

اقرأ المزيد
978-0-387-77996-6
Policies and Research in Identity Management : First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

اقرأ المزيد
978-0-387-46274-5
Preserving Privacy in On-Line Analytical Processing (OLAP)

Preserving Privacy in On-Line Analytical Processing reviews a series of methods that can precisely answer data cube-style ...

اقرأ المزيد
978-3-030-17138-4
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

اقرأ المزيد
عدد الكتب: 141 - 160 /253