Electronic Books

Total Books: 101 - 120 /195
Generative Programming and Component Engineering

Generative Programming and Component Engineering (GPCE) is a leading - searchconferenceonautomaticprogrammingandcomponentengineering.These ...

Lee mas
Giving Death a Helping Hand : Physician-Assisted Suicide and Public Policy. An International Perspective

The volume focuses on public policy issues related to physician-assisted suicide. It offers a detailed analysis of the current ...

Lee mas
Hands-on Question Answering Systems with BERT : Applications in Neural Networks and Natural Language Processing / Navin Sabharwal

Begins with an overview of the technology landscape behind BERT. It takes you through the basics of NLP, including natural ...

Lee mas
How to Engineer Software: A Model-Based Approach / Steve Tockey

The book promotes development scalability through domain partitioning and subdomain partitioning. It also explores software ...

Lee mas
Information Hiding

This book constitutes the thoroughly refereed post-proceedings of the 9th International Workshop on Information Hiding, IH ...

Lee mas
Information Hiding

This volume constitutes the refereed post-proceedings of the 8th International Workshop on Information Hiding held in Alexandria, ...

Lee mas
Information Hiding

All papers were divided into eight sessions: digital media watermarking, steganalysis, digital forensics, steganography, ...

Lee mas
Information Security (vol. # 4176)

th This volume contains the papers presented at the 9 Information Security Conference (ISC 2006) held on Samos Island, Greece, ...

Lee mas
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Lee mas
Information Security Practice and Experience : 4th International Conference, ISPEC 2008 Sydney, Australia, April 21-23, 2008 Proceedings

The 4 th Information Security Practice and Experience Conference (ISPEC2008) was held at Crowne Plaza, Darling Harbour, Sydney, ...

Lee mas
Information Security and Cryptology (vol. # 3822)

The ?rst SKLOIS Conference on Information Security and Cryptography(CISC 2005) was organized by the State Key Laboratory ...

Lee mas
Information Security and Cryptology - ICISC 2004

The 7th International Conference on Information Security and Cryptology was organized by the Korea Institute of Information ...

Lee mas
Information Security and Cryptology - ICISC 2007

This book constitutes the refereed proceedings of the 10th International Conference on Information Security and Cryptology, ...

Lee mas
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

Lee mas
Information Systems Security (vol. # 3803)

The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...

Lee mas
Information Systems Security (vol. # 4332)

This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS ...

Lee mas
Introducing Blockchain with Java : Program, Implement, and Extend Blockchains with Java / Spiro Buzharovski

Includes numerous exercises and test questions to help you solidify what you have learned as you progress through the book, ...

Lee mas
Introduction to Biosemiotics

This book is addressed to students, researchers and academics who have barely heard of the emerging young science of Biosemiotics, ...

Lee mas
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

Lee mas
Intuitive Probability and Random Processes using MATLAB®

Intuitive Probability and Random Processes using MATLAB® is an introduction to probability and random processes that merges ...

Lee mas
Total Books: 101 - 120 /195