الكتب الالكترونية

عدد الكتب: 1 - 15 /15
978-3-030-57884-8
Artificial Intelligence and Security

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

اقرأ المزيد
978-3-030-57881-7
Artificial Intelligence and Security

This two-volume set LNCS 12239-12240 constitutes the refereed proceedings of the 6th International Conference on Artificial ...

اقرأ المزيد
978-3-540-31598-8
Computational Intelligence and Security (vol. # 3802)

The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on ...

اقرأ المزيد
978-3-540-49463-8
Cryptology and Network Security (vol. # 4301)

This book constitutes the refereed proceedings of the 5th International Conference on Cryptology and Network Security, CANS ...

اقرأ المزيد
978-3-540-35999-9
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

اقرأ المزيد
978-3-540-31805-7
Digital Watermarking (vol. # 3304)

We are happy to present to you the proceedings of the 3rd International Workshop on Digital Watermarking, IWDW 2004. Since ...

اقرأ المزيد
978-3-540-69403-8
Global E-Security : 4th International Conference, ICGeS 2008, London, UK, June 23-25, 2008. Proceedings

This book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...

اقرأ المزيد
978-3-030-28501-2
Guide to Efficient Software Design

This classroom-tested textbook presents an active-learning approach to the foundational concepts of software design. These ...

اقرأ المزيد
978-3-540-77370-2
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

اقرأ المزيد
978-3-540-30114-1
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

اقرأ المزيد
978-3-540-49610-6
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

اقرأ المزيد
978-981-15-8711-5
Multimedia Security: Algorithm Development, Analysis and Applications (Algorithms for Intelligent Systems) /

Provides an insight about various techniques used in multimedia security and identifies its progress in both technological ...

اقرأ المزيد
978-0-387-25096-0
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

اقرأ المزيد
978-3-540-31974-0
Secure Data Management (vol. # 3674)

This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...

اقرأ المزيد
978-3-540-69019-1
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

اقرأ المزيد
عدد الكتب: 1 - 15 /15