الكتب الالكترونية

عدد الكتب: 1421 - 1440 /4790
978-3-540-76947-7
Countering Counterfeit Trade : Illicit Market Insights, Best-Practice Strategies, and Management Toolbox

The book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...

اقرأ المزيد
NoIMG
Covid-19 tracking application with user helping features آية نور الدين شبيكة ؛ سالي نادر شعبان ؛ أنس محمد عيد الكجك ؛ محمد سعيد رشاد قهوة جي ؛ عمر عرنوس ؛ طارق ايبو ؛ إشراف د.ندى غنيم

The era of mobile technology opens the windows to the mobile apps. The websites are vanishing and the mobile phones are emerging. ...

اقرأ المزيد
978-3-030-00722-5
Craniofacial 3D Imaging: Current Concepts in Orthodontics and Oral and Maxillofacial Surgery

This book is designed to serve as an up-to-date reference on the use of cone-beam computed tomography for the purpose of ...

اقرأ المزيد
978-3-540-75195-3
Creating New Learning Experiences on a Global Scale

It is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...

اقرأ المزيد
978-3-540-75195-3
Creating New Learning Experiences on a Global Scale

It is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...

اقرأ المزيد
978-1-84628-088-7
Creating Web-based Laboratories

Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is ...

اقرأ المزيد
NoIMG
Creative Environments

This book contains four parts. The first part presents a further development of models of knowledge creation presented already ...

اقرأ المزيد
NoIMG
Crime detection camera / Adnan Aji , Duha Aljubbeh , Laila Tarabih , Marwan Osta Halabi and Nour Alhuda Zeiter ; Supervised by Raouf Hamdan and Massa Albaali عدنان عامر عاجي ، ضحى الجبة ، ليلى طرابية ، مروان الاسطة حلبي و نور الهدى محمد رضا زعيتر ؛ إشراف رؤوف حمدان و ماسة البعلي

This paper presents a comprehensive crime detection system that uses a combination of hardware and software to monitor homes ...

اقرأ المزيد
978-3-540-69084-9
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-0-387-71862-0
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

اقرأ المزيد
978-0-387-75462-8
Critical Infrastructure Protection

This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.

اقرأ المزيد
978-0-387-75462-8
Critical Infrastructure Protection

This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.

اقرأ المزيد
978-1-84628-825-8
Crowd Simulation

Focuses on methods and techniques for crowd simulation, filling the gap in the professional literature. This survey covers ...

اقرأ المزيد
NoIMG
Crowd investment platform / Abdulkaleq Bathawy ; Rama Shikhany ; Yara Ahmed ; Yusra Almousa ; Supervised by Dr. Ubai Sendouk عبد الخالق بطحاوي ؛ راما شيخاني ؛ يارا احمد و يسرى صالح الموسى ؛ إشراف أبي صندوق

Investment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...

اقرأ المزيد
978-0-387-48742-7
Cryptanalytic Attacks on RSA

RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...

اقرأ المزيد
9781398600683
Crypto Wars : Faked Deaths, Missing Billions and Industry Disruption / Erica Stanford

Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...

اقرأ المزيد
978-0-387-34189-7
CryptoGraphics

CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...

اقرأ المزيد
978-0-387-36682-1
Cryptographic Algorithms on Reconfigurable Hardware

This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...

اقرأ المزيد
978-3-540-31940-5
Cryptographic Hardware and Embedded Systems - CHES 2005

Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...

اقرأ المزيد
عدد الكتب: 1421 - 1440 /4790