الكتب الالكترونية

عدد الكتب: 1401 - 1420 /4684
NoIMG
Creative Environments

This book contains four parts. The first part presents a further development of models of knowledge creation presented already ...

اقرأ المزيد
NoIMG
Crime detection camera / Adnan Aji , Duha Aljubbeh , Laila Tarabih , Marwan Osta Halabi and Nour Alhuda Zeiter ; Supervised by Raouf Hamdan and Massa Albaali عدنان عامر عاجي ، ضحى الجبة ، ليلى طرابية ، مروان الاسطة حلبي و نور الهدى محمد رضا زعيتر ؛ إشراف رؤوف حمدان و ماسة البعلي

This paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...

اقرأ المزيد
978-3-540-69084-9
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-0-387-75462-8
Critical Infrastructure Protection

This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.

اقرأ المزيد
978-0-387-75462-8
Critical Infrastructure Protection

This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.

اقرأ المزيد
978-1-84628-825-8
Crowd Simulation

Focuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...

اقرأ المزيد
NoIMG
Crowd investment platform / Abdulkaleq Bathawy ; Rama Shikhany ; Yara Ahmed ; Yusra Almousa ; Supervised by Dr. Ubai Sendouk عبد الخالق بطحاوي ؛ راما شيخاني ؛ يارا احمد و يسرى صالح الموسى ؛ إشراف أبي صندوق

Investment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...

اقرأ المزيد
978-0-387-48742-7
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

اقرأ المزيد
9781398600683
Crypto Wars : Faked Deaths, Missing Billions and Industry Disruption / Erica Stanford

Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...

اقرأ المزيد
978-0-387-34189-7
CryptoGraphics

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...

اقرأ المزيد
978-0-387-36682-1
Cryptographic Algorithms on Reconfigurable Hardware

This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...

اقرأ المزيد
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
978-3-540-46561-4
Cryptographic Hardware and Embedded Systems - CHES 2006

These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-74735-2
Cryptographic Hardware and Embedded Systems - CHES 2007

The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...

اقرأ المزيد
978-3-540-85053-3
Cryptographic Hardware and Embedded Systems - CHES 2008 : 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings

This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...

اقرأ المزيد
978-3-030-34142-8
Cryptography Arithmetic : Algorithms and Hardware Architectures

Modern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...

اقرأ المزيد
978-3-540-32418-8
Cryptography and Coding

Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...

اقرأ المزيد
عدد الكتب: 1401 - 1420 /4684