Electronic Books

Total Books: 1 - 20 /70
Advances in Cryptology - ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology ...

Lee mas
Advances in Information and Computer Security

this year in Kyoto and to publish the proceedings as a volume of the Lecture Notes in Computer Science series. The workshop ...

Lee mas
Advances in Web and Network Technologies, and Information Management

With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...

Lee mas
Advances in Web and Network Technologies, and Information Management

With the increasing ubiquity of personal computing devices, such as mobile phones and PDAs, and the increasing deployment ...

Lee mas
Blockchain and Other Emerging Technologies for Digital Business Strategies / Hamid Jahankhani, David V. Kilpin

Aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst ...

Lee mas
Business Partner Management : Successfully Managing External and Internal Business Relationships / Klaus Krause

Provides a structured, industry-independent and at the same time practical insight into all types of business partnerships. ...

Lee mas
NoIMG
Computational Intelligence in Information Assurance and Security

The global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...

Lee mas
Computer Network Security (vol. # 3685)

This volume contains papers presented at the 3rd International Workshop on Mathematical Methods, Models and Architectures ...

Lee mas
Computer Viruses and Malware

This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...

Lee mas
Cyber Security : Critical Infrastructure Protection / Martti Lehto, Pekka Neittaanmäki

Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...

Lee mas
Data Security : Technical and Organizational Protection Measures against Data Loss and Computer Crime / Thomas H. Lenhard

Offers an easy-to understand introduction to technical and organizational data security. It provides an insight into the ...

Lee mas
Databases in Networked Information Systems

This book constitutes the refereed proceedings of the 4th International Workshop on Databases in Networked Information Systems, ...

Lee mas
Digital Fluency : Understanding the Basics of Artificial Intelligence, Blockchain Technology, Quantum Computing, and Their Applications for Digital Transformation / Volker Lang

If you are curious about the basics of artificial intelligence, blockchain technology, and quantum computing as key enablers ...

Lee mas
Digital Rights Management

The First International Conference on Digital Rights Management: Technology, Issues, Challenges and Systems (DRMTICS – ...

Lee mas
Enterprise Interoperability III : New Challenges and Industrial Approaches

This book provides knowledge for cost savings and business improvement as well as new technical solutions. Composed of over ...

Lee mas
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lee mas
Fifth World Conference on Information Security Education

The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...

Lee mas
Financial Cryptography and Data Security (vol. # 3570)

The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...

Lee mas
Grid Computing Security

In this book Chakrabarti has structured the issues pertaining to grid computing security into three main categories: architecture-related, ...

Lee mas
Handbook of Digital Face Manipulation and Detection : From DeepFakes to Morphing Attacks / Christian Rathgeb

Provides the first comprehensive collection of studies dealing with the hot topic of digital face manipulation such as DeepFakes, ...

Lee mas
Total Books: 1 - 20 /70