Electronic Books

Total Books: 1161 - 1180 /1261
978-3-540-32732-5
Theory of Cryptography (vol. # 3876)

This book constitutes the refereed proceedings of the PrefaceTCC 2006 was the third Theory of Cryptography Conference, which ...

Continue reading
978-3-540-78524-8
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Continue reading
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

Continue reading
978-3-540-71209-1
Tools and Algorithms for the Construction and Analysis of Systems

Coverage includes software verification, probabilistic model checking and markov chains, automata-based model checking, security, ...

Continue reading
978-3-319-89960-2
Tools and Algorithms for the Construction and Analysis of Systems

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...

Continue reading
978-3-319-89963-3
Tools and Algorithms for the Construction and Analysis of Systems

The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...

Continue reading
NoIMG
Tools and Algorithms for the Construction and Analysis of Systems : 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part I

This book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...

Continue reading
NoIMG
Tools and Algorithms for the Construction and Analysis of Systems : 28th International Conference, TACAS 2022, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Munich, Germany, April 2–7, 2022, Proceedings, Part II

This book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...

Continue reading
978-3-540-79263-5
Topics in Cryptology - CT-RSA 2008 : The Cryptographers’ Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings

This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...

Continue reading
978-3-540-30574-3
Topics in Cryptology -- CT-RSA 2005

This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...

Continue reading
978-3-540-32648-9
Topics in Cryptology -- CT-RSA 2006

This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...

Continue reading
978-0-387-85691-9
Towards Sustainable Society on Ubiquitous Networks : The 8th IFIP Conference on e-Business, e-Services, and e-Society (I3E 2008), September 24–16, 2008, Tokyo, Japan

The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...

Continue reading
978-3-030-67130-3
Towards a Natural Social Contract Transformative Social-Ecological Innovation for a Sustainable, Healthy and Just Society

This book states that the endemic societal faultlines of our times are deeply intertwined and that they confront us with ...

Continue reading
978-3-540-89897-9
Towards a Service-Based Internet : First European Conference, ServiceWave 2008, Madrid, Spain, December 10-13, 2008. Proceedings

This volume includes adaption/monitoring, model driven architecture, network services, service oriented architecture, business ...

Continue reading
978-3-540-49072-2
Transactions on Data Hiding and Multimedia Security I

This inaugural issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Continue reading
978-3-540-73092-7
Transactions on Data Hiding and Multimedia Security II

This second issue contains five papers dealing with a wide range of topics related to multimedia security. The first paper ...

Continue reading
978-3-540-69019-1
Transactions on Data Hiding and Multimedia Security III

The first two papers deal with the security of steganographic systems; the third paper presents a novel image steganographic ...

Continue reading
978-3-540-32016-6
Transactions on Rough Sets IV

Volume IV of the Transactions on Rough Sets (TRS) introduces a number of new advances in the theory and application of rough ...

Continue reading
978-3-540-71200-8
Transactions on Rough Sets VI

this volume introduces a number of new advances in the foundations and applications of artificial intelligence, engineering, ...

Continue reading
978-1-4020-6736-5
Transboundary Water Resources: A Foundation for Regional Stability in Central Asia

The Central Asian republics and neighboring countries are currently experiencing these problems - problems that will become ...

Continue reading
Total Books: 1161 - 1180 /1261