Electronic Books

Total Books: 501 - 520 /530
978-3-540-68979-9
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Continue reading
978-0-387-23917-0
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

Continue reading
978-3-540-31483-7
Trustworthy Global Computing

Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...

Continue reading
978-3-540-78663-4
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Continue reading
978-1-4020-3685-9
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

Continue reading
NoIMG
Turbo-like Codes

A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...

Continue reading
NoIMG
Ultimate Limit-State Design of Concrete Structures A new approach

Structural concrete members often show great deviation in structural performance from that predicted by the current code ...

Continue reading
978-1-78561-834-5
Ultrascale Computing Systems

The needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...

Continue reading
978-88-470-0517-4
Un invito allAlgebra

The book offers a basic course in algebra for university students, structured according to the new regulations. Themes such ...

Continue reading
978-3-662-62157-8
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

Continue reading
978-3-540-31739-5
Universal Access in Health Telematics

Information Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...

Continue reading
978-1-84800-017-9
Value-Range Analysis of C Programs : Towards Proving the Absence of Buffer Overflow Vulnerabilities

The use of static analysis techniques to prove the partial correctness of C code has recently attracted much attention due ...

Continue reading
978-1-84628-959-0
Variable-length Codes for Data Compression

Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...

Continue reading
978-1-4020-5566-9
Video Traces for Network Performance Evaluation

Multimedia networking applications and, in particular, the transport of c- pressed video are expected to contribute signi?cantly ...

Continue reading
978-0-387-74508-4
Violence in Europe

Taking the sociocultural long view, Violence in Europe analyzes the prevalence and role of violence—from street crime to ...

Continue reading
978-1-4302-0295-0
Visual Basic 2005 Recipes

Visual Basic 2005 Recipes: A Problem-Solution Approach recognizes this fine balance. This book meets your need for fast, ...

Continue reading
978-1-4302-0604-0
Visual Basic 2008 Recipes : A Problem-Solution Approach

Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium ...

Continue reading
978-1-4302-0115-1
Visual C# 2005 Recipes

Mastering .NET development is as much about understanding the functionality of the .NET Framework as it is about the syntax ...

Continue reading
978-0-387-49431-9
Vorticity, Statistical Mechanics, and Monte Carlo Simulation

This book is drawn from across many active fields of mathematics and physics, and has connections to atmospheric dynamics, ...

Continue reading
978-0-387-74390-5
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Continue reading
Total Books: 501 - 520 /530