Electronic Books

Total Books: 61 - 80 /162
1119521130
Dynamic Magma Evolution / Francesco Vetere

Understanding the magmatic processes responsible for the chemical and textural signatures of volcanic products and igneous ...

Continue reading
978-0-387-68614-1
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

Continue reading
978-0-387-68614-1
Economics of Identity Theft

This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...

Continue reading
978-0-387-44606-6
Electronic Postage Systems

This book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...

Continue reading
978-0-387-44606-6
Electronic Postage Systems

This book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...

Continue reading
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Continue reading
978-3-540-49346-4
Face Biometrics for Personal Identification

This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...

Continue reading
978-3-540-46088-6
Financial Cryptography

Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...

Continue reading
978-3-540-31680-0
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Continue reading
978-3-540-46256-9
Financial Cryptography and Data Security (vol. # 4107)

This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...

Continue reading
978-3-540-85230-8
Financial Cryptography and Data Security : 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...

Continue reading
978-3-540-31847-7
Formal Methods in Software and Systems Modeling

By presenting state-of-the-art research results on various aspects of formal and visual modeling of software and systems, ...

Continue reading
978-3-540-27321-9
From Dust To Stars

Studies of stellar formation in galaxies have a profound impact on our understanding of the present and the early universe. ...

Continue reading
978-1-4020-8837-7
From Fossils to Astrobiology : Records of Life on Earth and Search for Extraterrestrial Biosignatures

From Fossils to Astrobiology reviews developments in paleontology and geobiology that relate to the rapidly-developing field ...

Continue reading
978-3-540-73814-5
Frontiers in Algorithmics

This book constitutes the refereed proceedings of the First Annual International Frontiers of Algorithmics Workshop, FAW ...

Continue reading
978-3-540-74124-4
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Continue reading
978-3-540-88961-8
Information Hiding : 10th International Workshop, IH 2008, Santa Barbara, CA, USA, May 19-21, 2008, Revised Selected Papers

This book constitutes the thoroughly refereed post-workshop proceedings of the 10th International Workshop on Information ...

Continue reading
978-3-540-38343-7
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Continue reading
978-3-540-85886-7
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

Continue reading
978-3-540-77535-5
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Continue reading
Total Books: 61 - 80 /162