Electronic Books

Total Books: 1 - 2 /2
Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems

Constitutes the refereed proceedings of the First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop on Information Security ...

Lee mas
Verification of Object-Oriented Software. The KeY Approach

features of the programming languages we employ in these programs are plentiful, including object-oriented organizations ...

Lee mas
Total Books: 1 - 2 /2