Electronic Books

Total Books: 121 - 140 /218
978-3-540-49114-9
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Continue reading
978-3-540-73458-1
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Continue reading
978-3-030-55304-3
Information Security and Privacy

This book constitutes the refereed proceedings of the 25th Australasian Conference on Information Security and Privacy, ACISP ...

Continue reading
978-3-540-31684-8
Information Security and Privacy (vol. # 3574)

Constitutes the refereed proceedings of the 10th Australasian Conference on Information Security and Privacy, ACISP 2005, ...

Continue reading
978-3-540-35459-8
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

Continue reading
978-3-030-65610-2
Information Systems Security

This book constitutes the proceedings of the 16th International Conference on Information Systems Security, ICISS 2020, held ...

Continue reading
978-3-030-49443-8
Information Systems Security and Privacy

This book constitutes the revised selected papers of the 5th International Conference on Information Systems Security and ...

Continue reading
978-3-540-49497-3
Information and Communications Security (vol. # 4307)

It is our great pleasure to welcome you to the Eighth International Conference on Information and Communications Security ...

Continue reading
978-3-540-31645-9
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

Continue reading
978-3-030-62223-7
Machine Learning for Cyber Security

This three volume book set constitutes the proceedings of the Third International Conference on Machine Learning for Cyber ...

Continue reading
978-3-540-77024-4
Mobile Ad-Hoc and Sensor Networks

This book constitutes the refereed proceedings of the Third International Conference on Mobile Ad-hoc and Sensor Networks, ...

Continue reading
978-3-540-49933-6
Mobile Ad-hoc and Sensor Networks (vol. # 4325)

This book constitutes the refereed proceedings of the Second International Conference on Mobile Ad-hoc and Sensor Networks, ...

Continue reading
978-981-32-9034-1
Molecular Pharmacognosy

This book discusses the application of molecular biology in resource science and authentication of traditional Chinese medicine ...

Continue reading
978-3-540-39393-1
Multimedia Content Representation, Classification and Security

This book constitutes the refereed proceedings of the International Workshop on Multimedia Content Representation, Classification ...

Continue reading
978-3-540-69568-4
Multimodal Technologies for Perception of Humans

This book constitutes the thoroughly refereed post-proceedings of the First International CLEAR 2006 Evaluation Campaign ...

Continue reading
978-3-540-68585-2
Multimodal Technologies for Perception of Humans : International Evaluation Workshops CLEAR 2007 and RT 2007, Baltimore, MD, USA, May 8-11, 2007, Revised Selected Papers

This book constitutes the thoroughly refereed joint post-workshop proceedings of two co-located events: the Second International ...

Continue reading
978-3-540-31578-0
Multiple Classifier Systems

Constitutes the refereed proceedings of the 6th International Workshop on Multiple Classifier Systems, MCS 2005. This book ...

Continue reading
978-3-540-88140-7
Network and Parallel Computing : IFIP International Conference, NPC 2008, Shanghai, China, October 18-20, 2008. Proceedings

This book constitutes the refereed proceedings of the IFIP International Conference on Network and Parallel Computing, NPC ...

Continue reading
978-0-387-68848-0
Network-Aware Security for Group Communications

Network-Aware Security for Group Communications fills a growing need in the research community for a reference that describes ...

Continue reading
978-3-540-71641-9
Networked RFID Systems and Lightweight Cryptography : Raising Barriers to Product Counterfeiting

This book considers the methods used by illicit manufactures and traders to introduce counterfeit goods into the supply chain, ...

Continue reading
Total Books: 121 - 140 /218