Electronic Books

Total Books: 1 - 12 /12
Algorithms for Sensor and Ad Hoc Networks

Thousands of mini computers (comparable to a stick of chewing gum in size), equipped with sensors, are deployed in some terrain ...

Lee mas
Algorithms for Sensor and Ad Hoc Networks

Thousands of mini computers (comparable to a stick of chewing gum in size), equipped with sensors, are deployed in some terrain ...

Lee mas
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lee mas
Detection of Intrusions and Malware, and Vulnerability Assessment

This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response

Lee mas
Detection of Intrusions and Malware, and Vulnerability Assessment : 5th International Conference, DIMVA 2008, Paris, France, July 10-11, 2008. Proceedings

This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...

Lee mas
Information Security

The 10th Information Security Conference (ISC 2007) was held in Valpara´ ?so, Chile, October 9–12, 2007. ISC is an annual ...

Lee mas
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

Lee mas
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

Lee mas
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Lee mas
Public Key Cryptography - PKC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Theory and Practice of Public-Key Cr- ...

Lee mas
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lee mas
Public Key Cryptography - PKC 2008 : 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

This book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...

Lee mas
Total Books: 1 - 12 /12