الكتب الالكترونية

عدد الكتب: 1 - 2 /2
978-3-540-72354-7
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

اقرأ المزيد
978-3-540-69061-0
Verification of Object-Oriented Software. The KeY Approach

features of the programming languages we employ in these programs are plentiful, including object-oriented organizations ...

اقرأ المزيد
عدد الكتب: 1 - 2 /2