Electronic Books

Total Books: 5141 - 5160 /7071
Principles of Protocol Design

Introduces the reader to the principles used in the construction of a large range of modern data communication protocols. ...

Weiterlesen
Principles of Security and Trust

This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...

Weiterlesen
Principles of Security and Trust

This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...

Weiterlesen
Principles of Signal Detection and Parameter Estimation

This new textbook is for contemporary signal detection and parameter estimation courses offered at the advanced undergraduate ...

Weiterlesen
Principles of Signals and Systems / Orhan Gazi

Presents basic concepts of signals and systems in a clear manner, based on the author’s 15+ years of teaching the undergraduate ...

Weiterlesen
Principles of Soil Conservation and Management

“Principles of Soil Management and Conservation” comprehensively reviews the state-of-knowledge on soil erosion and management. ...

Weiterlesen
Principles of Spread-Spectrum Communication Systems

This book provides a concise but lucid explanation and derivation of the fundamentals of spread-spectrum communication systems. Although ...

Weiterlesen
NoIMG
Principles of Translational Science in Medicine : From Bench to Bedside

Principles of Translational Science in Medicine: From Bench to Bedside, Third Edition, provides an update on major achievements ...

Weiterlesen
Principles of auditing & other assurance services / O. Ray Whittington, Kurt Pany

Provides a care-fully balanced presentation of auditing theory and practice. The approach is to integrate auditing material ...

Weiterlesen
Principles of the Spin Model Checker

Principles of Spin is an introductory book for students and practicing software engineers who wish to learn Promela and Spin. ...

Weiterlesen
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks : Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed proceedings of the 10th International Workshop on Principles, Systems and Applications ...

Weiterlesen
Privacy Enhancing Technologies

This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...

Weiterlesen
Privacy Enhancing Technologies (vol. # 3424)

Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...

Weiterlesen
Privacy Enhancing Technologies (vol. # 4258)

The papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...

Weiterlesen
Privacy Enhancing Technologies : 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings

Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...

Weiterlesen
Privacy and Data Protection in Software Services

The aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...

Weiterlesen
Privacy in Statistical Databases : UNESCO Chair in Data Privacy International Conference, PSD 2008, Istanbul, Turkey, September 24-26, 2008. Proceedings

Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...

Weiterlesen
Privacy, Security, and Trust in KDD : First ACM SIGKDD International Workshop, PinKDD 2007, San Jose, CA, USA, August 12, 2007, Revised Selected Papers

Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...

Weiterlesen
Privacy-Preserving Data Mining:Models and Algorithms

Privacy Preserving Data Mining: Models and Algorithms proposes a number of techniques to perform the data mining tasks in ...

Weiterlesen
Privacy-Respecting Intrusion Detection

With our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...

Weiterlesen
Total Books: 5141 - 5160 /7071