Electronic Books

Total Books: 3001 - 3020 /3759
Security and Privacy in Ad-hoc and Sensor Networks (vol. # 3813)

It clearly demonstrates the continued importance, popularity andtimeliness oftheworkshop’stopic: securityandprivacy inadhocandsensor ...

Lee mas
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Lee mas
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Lee mas
Security and Privacy in Digital Economy

This book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...

Lee mas
Security and Privacy in Social Networks and Big Data

This book constitutes revised and selected papers from the 6th International Symposium on Security and Privacy in Social ...

Lee mas
Security and Trust Management : 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings

This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...

Lee mas
Security in Communication Networks

The main topics included all technical aspects of data security, including: anonymity,authentication,blockciphers,complexity-basedcryptography,cry- ...

Lee mas
Security in Computer and Information Sciences

This open access book constitutes the thoroughly refereed proceedings of the First International ISCIS Security Workshop ...

Lee mas
Security of Networks and Services in an All-Connected World

This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...

Lee mas
Security of Water Supply Systems: From Source to Tap

Recent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...

Lee mas
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

Lee mas
Security-first compliance for small businesses / Karen M. Walsh

Organizations of all sizes struggle to secure their data in a constantly evolving digital landscape. Expanding digital footprints ...

Lee mas
Seizures in Critical Care

Epileptic events are now known to occur more frequently in the intensive care unit (ICU) than previously thought, a situation ...

Lee mas
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

Lee mas
Selected Essays in Empirical Asset Pricing

Financial researchers extensively discuss the efficiency of capital markets and the existence of possible misreactions in ...

Lee mas
Selected Topics in Cancer Modeling : Genesis, Evolution, Immune Competition, and Therapy

A major challenge in the modeling and simulation of tumor growth is the mathematical description of living matter, which ...

Lee mas
NoIMG
Selected Topics in Dynamics and Control of Chemical and Biological Processes

In view of the rapid changes in requirements, it has became necessary to place at the reader's disposal a book dealing with ...

Lee mas
Selection Methods in Plant Breeding

Written for plant breeders, researchers and post-graduate students, this book provides a comprehensive review of the methods ...

Lee mas
Selective Estrogen Receptor Modulators

The concept of selective estrogen receptor modulators (SERMs) has emerged recently in modern medicine. Two main features, ...

Lee mas
Self-Assembled Nanomaterials I : Nanofibers

This series presents reviews of the present and future trends in polymer and biopolymer science including chemistry, physical ...

Lee mas
Total Books: 3001 - 3020 /3759