الكتب الالكترونية

عدد الكتب: 181 - 195 /195
978-0-387-79026-8
The Future of Identity in the Information Society: Proceedings of the Third IFIP WG 9.2, 9.6/11.6, 11.7/FIDIS International Summer School on The Future of Identity in the Information Society, Karlstad University, Sweden, August 4–10, 2007

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The ...

اقرأ المزيد
978-3-540-79263-5
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

اقرأ المزيد
978-3-540-32648-9
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

اقرأ المزيد
978-3-540-68979-9
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

اقرأ المزيد
978-0-387-23917-0
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

اقرأ المزيد
978-3-540-31483-7
Trustworthy Global Computing

Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...

اقرأ المزيد
978-1-4020-3685-9
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

اقرأ المزيد
NoIMG
Turbo-like Codes

A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...

اقرأ المزيد
978-1-84628-959-0
Variable-length Codes for Data Compression

Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...

اقرأ المزيد
978-0-387-74390-5
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

اقرأ المزيد
NoIMG
Wind Effects on Buildings and Design of Wind-Sensitive Structures

The articles in this book, written by seven internationally known experts, present the fundamentals and practical applications ...

اقرأ المزيد
978-0-387-73825-3
Wireless Communications 2007 CNIT Thyrrenian Symposium

Wireless Communications: 2007 CNIT Thyrrhenian Symposium compiles the papers presented at the 2007 Thyrrenian International ...

اقرأ المزيد
978-3-540-31963-4
Wireless Systems and Mobility in Next Generation Internet

The Internet is subject to permanent modi?cations and to continuous restr- turing. This is primarily due to the tremendous ...

اقرأ المزيد
978-3-540-70969-5
Wireless Systems and Mobility in Next Generation Internet

This book It covers WLAN characterization, vehicular networks, WLAN and sensor networks protocols, QoS and routing in ad-hoc ...

اقرأ المزيد
978-0-387-36542-8
Women and the Mafia

The book introduces us to the professional women of the Argentine "mafia state", Albanian human traffickers, spies for ...

اقرأ المزيد
عدد الكتب: 181 - 195 /195