Electronic Books

Total Books: 81 - 100 /112
Neural Information Processing (vol. # 4232)

This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...

Lee mas
Neural Information Processing (vol. # 4233)

The three volume set LNCS 4232, LNCS 4233, and LNCS 4234 constitutes the refereed proceedings of the 13th International Conference ...

Lee mas
Neural Information Processing (vol. # 4234)

This book and its companion volumes constitute the Proceedings of the 13th - ternationalConferenceonNeuralInformationProcessing(ICONIP2006)heldin ...

Lee mas
New Approaches for Security, Privacy and Trust in Complex Environments

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS

Constitutes the proceedings of the 5 confederated international conferences on Cooperative Information Systems, Distributed ...

Lee mas
On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS

This two-volume set LNCS 4803/4804 constitutes the refereed proceedings of the five confederated international conferences ...

Lee mas
On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part I

This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...

Lee mas
On the Move to Meaningful Internet Systems: OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, Proceedings, Part II

This two-volume set LNCS 5331/5332 constitutes the refereed proceedings of the five confederated international conferences ...

Lee mas
Optical and Digital Techniques for Information Security

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies ...

Lee mas
Peer-to-Peer Video

Peer-to-Peer (P2P) is a communication structure in which individuals interact directly, without going through a centralized ...

Lee mas
Principles of Information Security / Michael E. Whitman and Herbert J. Mattord

Emphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...

Lee mas
Proceedings of The IFIP Tc 11 23 "rd" International Information Security Conference : IFIP 20th World Computer Congress, IFIP SEC’08, September 7-10, 2008, Milano, Italy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Product Lifecycle Management

The significance of product lifecycle management (PLM - Product Lifecycle Management, formerly referred to, in a narrower ...

Lee mas
Progress in Cryptology - INDOCRYPT 2004

The INDOCRYPT series of conferences started in 2000. INDOCRYPT 2004 was the ?fth one in this series. The popularity of this ...

Lee mas
Progress in Cryptology - INDOCRYPT 2005

Constitutes the proceedings of the 6th International Conference on Cryptology in India, held in 2005. The papers are organized ...

Lee mas
Progress in Cryptology – Mycrypt 2005

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized ...

Lee mas
Quality Of Protection

Information security in the business setting has matured in the last few decades. Standards, such as IS017799, the Common ...

Lee mas
Quantum Blockchain: An Emerging Cryptographic Paradigm / Rajesh Kumar Dhanaraj, Vani Rajasekar, SK Hafizul Islam, Balamurugan Balusamy, Ching-Hsien Hsu

While addressing the security challenges and threats in blockchain, this book is also an introduction to quantum cryptography ...

Lee mas
Security Infrastructure Technology for Integrated Utilization of Big Data Applied to the Living Safety and Medical Fields

This book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...

Lee mas
Security Protocols

Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...

Lee mas
Total Books: 81 - 100 /112