Electronic Books

Total Books: 281 - 300 /1403
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

Weiterlesen
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Weiterlesen
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Weiterlesen
Computer Supported Cooperative Work in Design III

The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...

Weiterlesen
Computer Supported Cooperative Work in Design III

The design of complex artifacts and systems requires the cooperation of multidiscip- nary design teams using multiple commercial ...

Weiterlesen
Computer Viruses and Malware

This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...

Weiterlesen
Computer Viruses: from theory to applications

The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...

Weiterlesen
Computer Vision and Graphics

This book constitutes the refereed proceedings of the International Conference on Computer Vision and Graphics, ICCVG 2020, ...

Weiterlesen
NoIMG
Computer Vision and Internet of Things : Technologies and Applications / Lavanya Sharma, Mukesh Carpenter

Explores the utilization of Internet of Things (IoT) with computer vision and its underlying technologies in different applications ...

Weiterlesen
Computer and Information Sciences - ISCIS 2005

This book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ...

Weiterlesen
Computer and Information Seciences - ISCIS 2006

Thesearetheproceedingsofthe21stInternationalSymposiumonComputerand ? Information Sciences (ISCIS 2006) held in Istanbul, ...

Weiterlesen
Computing Science, Communication and Security

This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...

Weiterlesen
Computing Science, Communication and Security

This book constitutes revised selected papers of the First International Conference on Computing Science, Communication and ...

Weiterlesen
Concurrent Zero-Knowledge

Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly ...

Weiterlesen
Constituents of Modern System-safety Thinking

Constituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...

Weiterlesen
Constructing Ambient Intelligence : AmI 2007 Workshops Darmstadt, Germany, November 7-10, 2007 Revised Papers

This book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...

Weiterlesen
Constructing Roma Migrants : European Narratives and Local Governance

This book presents a cross-disciplinary insight and policy analysis into the effects of European legal and political frameworks ...

Weiterlesen
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Weiterlesen
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3956)

This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...

Weiterlesen
Contemporary Cryptology / Public key encription / Random functions / computational complexity / cryptography / cryptology

The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent ...

Weiterlesen
Total Books: 281 - 300 /1403