الكتب الالكترونية

عدد الكتب: 1521 - 1540 /1614
NoIMG
Trends in Supply Chain Design and Management

With the rapid development of information and network technologies and market requirements, new challenges in supply chain ...

اقرأ المزيد
978-3-540-28974-6
True Visions

Written for the non-specialist seeking an authoritative but accessible overview of this interdisciplinary field, True Visions ...

اقرأ المزيد
978-3-540-34297-7
Trust Management (vol. # 3986)

This book constitutes the refereed proceedings of the 4th International Conference on Trust Management, iTrust 2006. 30 revised ...

اقرأ المزيد
978-0-387-09428-1
Trust Management II : Proceedings of IFIPTM 2008: Joint iTrust and PST Conferences on Privacy, Trust Management and Security, June 18-20, 2008, Trondheim, Norway

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

اقرأ المزيد
978-3-540-92803-4
Trust in Agent Societies : 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12 -13, 2008. Revised Selected and Invited Papers

The volume is organized in ternary topical sections on theoretical and applicative aspects of trust (from a engineering, ...

اقرأ المزيد
978-3-540-74409-2
Trust, Privacy and Security in Digital Business

This book presents the proceedings of the 4th International Conference on Trust, Privacy and Security in Digital Business ...

اقرأ المزيد
978-3-540-85735-8
Trust, Privacy and Security in Digital Business : 5th International Conference, TrustBus 2008 Turin, Italy, September 4-5, 2008 Proceedings

The book is organized in topical sections on trust, authentication, authorization and access control, reputation systems, ...

اقرأ المزيد
978-3-540-68979-9
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

اقرأ المزيد
978-0-387-23917-0
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

اقرأ المزيد
978-1-4020-3685-9
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

اقرأ المزيد
978-3-030-79276-3
Ubiquitous Communications and Network Computing

This book constitutes the refereed proceedings of the 4th International Conference on Ubiquitous Communications and Network ...

اقرأ المزيد
978-3-540-69293-5
Ubiquitous Intelligence and Computing : 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008 Proceedings

The book includes ubiquitous computing, smart spaces/environments/services, context-aware services and applications, intelligent ...

اقرأ المزيد
978-1-84628-321-5
Ubiquitous and Pervasive Commerce

This book brings together the technological and business aspects of conducting commerce using ubiquitous and pervasive computing ...

اقرأ المزيد
978-0-387-49063-2
Ultrasonic Nondestructive Evaluation Systems

Ultrasonic Nondestructive Evaluation Systems: Models and Measurements provides the latest information and techniques available ...

اقرأ المزيد
978-3-540-38594-3
Unconventional Computation (vol. # 4135)

This book about The 5th International Conference on Unconventional Computation, UC 2006,organized under the auspices of the ...

اقرأ المزيد
978-1-4842-7821-5
Understand, Manage, and Measure Cyber Risk : Practical Solutions for Creating a Sustainable Cyber Program / Ryan Leirvik

Provides tools and methods in a straight-forward practical manner to guide the management of your cybersecurity program and ...

اقرأ المزيد
NoIMG
Understanding Blockchain and Cryptocurrencies : A Primer for Implementing and Developing Blockchain Projects / Akira Summers

Discusses and explains topics such as hashing, Merkle trees, nodes, mining, proof of work and proof of stake, consensus mechanisms ...

اقرأ المزيد
978-0-387-27636-6
Understanding Intrusion Detection through Visualization

This book presents Understanding Intrusion Detection through Visualization presents research on why false alarms are, and ...

اقرأ المزيد
978-3-540-71025-7
Universal Access in Ambient Intelligence Environments

This volume contains the proceedings of the last ERCIM “User Interfaces for All” Workshop. The work of the ERCIM WG UI4ALL ...

اقرأ المزيد
978-3-540-31739-5
Universal Access in Health Telematics

Information Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...

اقرأ المزيد
عدد الكتب: 1521 - 1540 /1614