Electronic Books

Total Books: 721 - 740 /966
Provenance and Annotation of Data

This book constitutes the thoroughly referred post-proceedings of the International Provenance and Annotation Workshops, ...

Lee mas
Public Administration in Germany

This book presents a topical, comprehensive and differentiated analysis of Germany’s public administration and reforms. ...

Lee mas
Public Key Cryptography - PKC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key ...

Lee mas
Public Key Infrastructure

These proceedings contain the papers accepted at the 2007 European PKI Workshop: Theory and Practice (EuroPKI 2007), held ...

Lee mas
Public Key Infrastructure (vol. # 3545)

This book contains the proceedings of the 2nd EuroPKI Workshop — EuroPKI 2005, held at the University of Kent in the city ...

Lee mas
Public Key Infrastructure (vol. # 4043)

To discuss progress in the PKI ?eld, the European PKI workshop series was established in 2004, following similar initiatives ...

Lee mas
Python for Cybersecurity: Using Python for Cyber Offense and Defense / Howard E. Poston

Delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework ...

Lee mas
Quality Of Protection

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...

Lee mas
Quality of Information and Communications Technology

This book constitutes the refereed proceedings of the 13th International Conference on the Quality of Information and Communications ...

Lee mas
Quality of Software Architectures

Although the quality of a system’s software architecture is one of the critical factors in its overall quality, the architecture ...

Lee mas
Quantum Magnetism

This bookis based on some of the lectures duringthe Paci?c Institute of Theoretical Physics (PITP) summer school on “Quantum ...

Lee mas
RFID Security and Privacy : Concepts, Protocols, and Architectures

The book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...

Lee mas
Radiation Detectors for Medical Applications

This book about The "NATO Advanced Research Workshop on radiation detectors for medical imaging" The talks of 14 keynote ...

Lee mas
Rational Cybersecurity for Business The Security Leaders' Guide to Business Alignment

This book presents six priority areas to focus on to maximize the effectiveness of your cybersecurity program: risk management, ...

Lee mas
Rational, Robust, and Secure Negotiations in Multi-Agent Systems

This book addresses all aspects of negotiation mechanisms in multi-agent systems, including Multi-Issue Negotiations, Concurrent ...

Lee mas
Recent Advances in Adsorption Processes for Environmental Protection and Security

The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...

Lee mas
Recent Advances in Adsorption Processes for Environmental Protection and Security

The purpose of the Workshop was to bring together researchers and en gineers working in adsorption related fields, to share ...

Lee mas
Recent Advances in Adsorption Processes for Environmental Protection and Security

Topics covered by the Workshop include recent theoretical and experi mental developments on environmental adsorption, adsorption ...

Lee mas
Recent Advances in Intrusion Detection

Here are the refereed proceedings of the 10th International Symposium on Recent Advances in Intrusion Detection. Papers cover ...

Lee mas
Recent Advances in Intrusion Detection (vol. # 3858)

This book presents the proceedings of the 8th Symposium on Recent Advances in Intrusion Detection (RAID 2005), which took ...

Lee mas
Total Books: 721 - 740 /966