Electronic Books

Total Books: 701 - 720 /920
978-1-4020-5093-0
Radiation Detectors for Medical Applications

This book about The "NATO Advanced Research Workshop on radiation detectors for medical imaging" The talks of 14 keynote ...

Continue reading
978-1-4842-5952-8
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment

This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...

Continue reading
978-1-4020-6805-8
Recent Advances in Adsorption Processes for Environmental Protection and Security

The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...

Continue reading
978-1-4020-6805-8
Recent Advances in Adsorption Processes for Environmental Protection and Security

The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...

Continue reading
978-1-4020-6805-8
Recent Advances in Adsorption Processes for Environmental Protection and Security

Topics covered by the Workshop include recent theoretical and experi mental developments on environmental adsorption, adsorption ...

Continue reading
978-3-540-74320-0
Recent Advances in Intrusion Detection

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...

Continue reading
978-3-540-31779-1
Recent Advances in Intrusion Detection (vol. # 3858)

This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...

Continue reading
978-3-540-39725-0
Recent Advances in Intrusion Detection (vol. # 4219)

This book presents the proceed-ings of the 9th Symposium on Recent Advances in Intrusion Detection (RAID2006), which took ...

Continue reading
978-3-540-87403-4
Recent Advances in Intrusion Detection : 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings

This book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...

Continue reading
978-3-540-73031-6
Requirements Engineering: Foundation for Software Quality

This book constitutes the refereed proceedings of the 13th International Working Conference on Requirements Engineering: ...

Continue reading
978-1-4020-8924-4
Rescue of Sturgeon Species in the Ural River Basin

Proceedings of the NATO Advanced Research Workshop on Rescue of Sturgeon Species by means of Transboundary Integrated Water ...

Continue reading
978-3-540-88353-1
Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...

Continue reading
978-1-4020-8489-8
Resilience of Cities to Terrorist and other Threats

Cities tend to become more crowded, the high rise buildings taller, the traffic nodes more complex. The volume of hazardous ...

Continue reading
978-3-540-34607-4
Reuse of Off-the-Shelf Components

Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...

Continue reading
978-3-540-89247-2
Runtime Verification : 8th International Workshop, RV 2008, Budapest, Hungary, March 30, 2008. Selected Papers

The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...

Continue reading
978-3-319-69790-1
Russia's Turn to the East

This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...

Continue reading
978-1-4020-6662-7
Safeguards in a World of Ambient Intelligence

It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...

Continue reading
978-3-030-59306-3
Safety and Security in Hotels and Home Sharing

This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...

Continue reading
978-3-540-31781-4
Satellite Events at the MoDELS 2005 Conference

This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...

Continue reading
978-3-540-75248-6
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Continue reading
Total Books: 701 - 720 /920