الكتب الالكترونية

عدد الكتب: 161 - 180 /332
978-3-540-32117-0
Human Interactive Proofs

Constitutes the refereed proceedings of the Second International Workshop on Human Interactive Proofs, HIP 2005, held in ...

اقرأ المزيد
NoIMG
IP Network-based Multi-agent Systems for Industrial Automation

IP Network-based Multi-agent Systems for Industrial Automation is the first book to present an introduction to the use of ...

اقرأ المزيد
978-0-387-75428-4
IP Networking over Next-Generation Satellite Systems : International Workshop, Budapest, July 2007

Highlights the very latest research output of several EU satellite-related projects and addresses many unresolved issues ...

اقرأ المزيد
978-3-540-75853-2
IP Operations and Management

This book constitutes the refereed proceedings of the 7th IEEE International Workshop on IP Operations and Management, IPOM ...

اقرأ المزيد
978-3-540-87357-0
IP Operations and Management : 8th IEEE International Workshop, IPOM 2008, Samos Island, Greece, September 22-26, 2008. Proceedings

Constitutes the refereed proceedings of the 8th IEEE Workshop on IP Operations and Management, IPOM 2008, held on Samos Island, ...

اقرأ المزيد
978-3-540-48001-3
IPv6 in Practice

This book is a practical guide to IPv6 addressing Unix and network administrators with experience in TCP/IP(v4) but not necessarily ...

اقرأ المزيد
NoIMG
ITI Treatment Guide, Volume 14 : Immediate Implant Placement and Loading-Single or Multiple Teeth Requiring Replacement / France Lambert, Adam Hamilton, Daniel Wismeijer, Stephen Barter, Nikolaos Donos

Outlines the current literature on immediate implant placement and immediate loading and elaborates on our understanding ...

اقرأ المزيد
978-0-387-26334-2
Impacts and Risk Assessment of Technology for Internet Security

The explosive popularity of the Internet as a business tool has created a new type of economy, which is called Technology-Enabled ...

اقرأ المزيد
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

اقرأ المزيد
978-3-540-30114-1
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

اقرأ المزيد
978-3-030-76228-5
Information Management and Big Data

This book constitutes the refereed proceedings of the 7th International Conference on Information Management and Big Data, ...

اقرأ المزيد
978-3-540-30582-8
Information Networking

Welcome to ICOIN 2005,the International Conference on Information Netwo- ing, held at Ramada Plaza Jeju Hotel, Jeju Island, ...

اقرأ المزيد
978-3-540-75496-1
Information Security

The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...

اقرأ المزيد
978-3-540-38343-7
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

اقرأ المزيد
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

اقرأ المزيد
978-3-540-71093-6
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

اقرأ المزيد
978-3-030-65299-9
Information Security Applications

This book constitutes the thoroughly refereed proceedings of the 21st International Conference on Information Security Applications, ...

اقرأ المزيد
978-3-540-33153-7
Information Security Applications (vol. # 3786)

Constitutes the refereed proceedings of the 6th International Workshop on Information Security Applications, held in 2005. ...

اقرأ المزيد
978-3-540-33058-5
Information Security Practice and Experience (vol. # 3903)

his volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...

اقرأ المزيد
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
عدد الكتب: 161 - 180 /332