Electronic Books

Total Books: 501 - 520 /530
Trusted Computing - Challenges and Applications : First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008 Proceedings

This volume covering the core issues of trust in IT systems and trusted computing and to bridge the gaps between international ...

Lee mas
Trusted Computing Platforms

Trusted Computing Platforms:Design and Applications fills this gap. Starting with early prototypes and proposed applications, ...

Lee mas
Trustworthy Global Computing

Constitutes the post-proceedings of the International Symposium on Trustworthy Global Computing. This book covers issues, ...

Lee mas
Trustworthy Global Computing : Third Symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007, Revised Selected Papers

The book focus on providing tools and frameworks for constructing well-behaved applications and for reasoning about their ...

Lee mas
Turbo Code Applications

Turbo Code Applications: a journey from a paper to realization presents c- temporary applications of turbo codes in thirteen ...

Lee mas
NoIMG
Turbo-like Codes

A major focus of Turbo-like Codes is on high speed turbo decoding, which targets applications with data rates of several ...

Lee mas
NoIMG
Ultimate Limit-State Design of Concrete Structures A new approach

Structural concrete members often show great deviation in structural performance from that predicted by the current code ...

Lee mas
Ultrascale Computing Systems

The needs of future digital data and computer systems are expected to be two to three orders of magnitude larger than for ...

Lee mas
Un invito allAlgebra

The book offers a basic course in algebra for university students, structured according to the new regulations. Themes such ...

Lee mas
Understanding Network Hacks : Attack and Defense with Python 3

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively ...

Lee mas
Universal Access in Health Telematics

Information Society for All (IS4ALL) is devoted to consolidating and codifying available knowledge of universal access in ...

Lee mas
Value-Range Analysis of C Programs : Towards Proving the Absence of Buffer Overflow Vulnerabilities

The use of static analysis techniques to prove the partial correctness of C code has recently attracted much attention due ...

Lee mas
Variable-length Codes for Data Compression

Most data compression methods that are based on variable-length codes employ the Huffman or Golomb codes. However, there ...

Lee mas
Video Traces for Network Performance Evaluation

Multimedia networking applications and, in particular, the transport of c- pressed video are expected to contribute signi?cantly ...

Lee mas
Violence in Europe

Taking the sociocultural long view, Violence in Europe analyzes the prevalence and role of violence—from street crime to ...

Lee mas
Visual Basic 2005 Recipes

Visual Basic 2005 Recipes: A Problem-Solution Approach recognizes this fine balance. This book meets your need for fast, ...

Lee mas
Visual Basic 2008 Recipes : A Problem-Solution Approach

Sometimes you just need to solve a problem and get on with your work. To that end, Visual Basic 2008 Recipes is a compendium ...

Lee mas
Visual C# 2005 Recipes

Mastering .NET development is as much about understanding the functionality of the .NET Framework as it is about the syntax ...

Lee mas
Vorticity, Statistical Mechanics, and Monte Carlo Simulation

This book is drawn from across many active fields of mathematics and physics, and has connections to atmospheric dynamics, ...

Lee mas
Vulnerability Analysis and Defense for the Internet

This book provides packet captures, flow charts and detailed analysis of a protocol and concepts of Reverse Engineering, ...

Lee mas
Total Books: 501 - 520 /530