Electronic Books

Total Books: 101 - 120 /177
Information Security and Cryptology (vol. # 4318)

The second SKLOIS Conference on Information Security and Cryptology 2006 (Inscrypt, formerly CISC) was organized by the State ...

Lee mas
Information Security and Cryptology - ICISC 2005

This book constitutes the thoroughly refereed postproceedings of the 8th International Conference on Information Security ...

Lee mas
Information Security and Cryptology – ICISC 2006

This book constitutes the refereed proceedings of the 9th International Conference on Information Security and Cryptology, ...

Lee mas
Information Security and Privacy

The book covers a wide array of key aspects in information security. The papers are organized in topical sections on stream ...

Lee mas
Information Security and Privacy (vol. # 4058)

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. ...

Lee mas
Information Theoretic Security : Third International Conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. Proceedings

This book constitutes the proceedings of the Third International Conference on Information Theoretic Security, held in Calgary, ...

Lee mas
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

Lee mas
Information and Communications Security (vol. # 3783)

The Seventh International Conference on Information and Communications - curity,ICICS2005,washeldinBeijing,China,10-13December2005. ...

Lee mas
Insider Attack and Cyber Security : Beyond the Hacker

This book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in computer ...

Lee mas
Intelligence and Security Informatics: Biosurveillance

The 2007 NSF BioSurveillance Workshop (BioSurveillance 2007) was built on the success of the first NSF BioSurveillance Workshop, ...

Lee mas
Interacting Particle Systems

This book presents a complete treatment of a new class of random processes, which have been studied intensively during the ...

Lee mas
Introduction to Contact Mechanics

Introduction to Contact Mechanics, Second Edition is a gentle introduction to the mechanics of solid bodies in contact for ...

Lee mas
Intrusion and Malware Detection and Vulnerability Assessment

On behalf of the Program Committee, it is our pleasure to present to you the proceedings of the 2nd GI SIG SIDAR Conference ...

Lee mas
Irritant Dermatitis

Irritant dermatitis is a common condition, accounting for a significant proportion of occupational skin disease. The recent ...

Lee mas
Issues of Decapod Crustacean Biology

This volume presents the proceedings of the eighth Colloquium Crustacea Decapoda Mediterranea, which was held at the Ionian ...

Lee mas
Machine Intelligence and Big Data Analytics for Cybersecurity Applications

This book presents the latest advances in machine intelligence and big data analytics to improve early warning of cyber-attacks, ...

Lee mas
Market Segmentation Analysis

This open access book offers something for everyone working with market segmentation: practical guidance for users of market ...

Lee mas
Mary and Early Christian Women

This book reveals exciting early Christian evidence that Mary was remembered as a powerful role model for women leaders—women ...

Lee mas
Metaheuristic Optimization Algorithms in Civil Engineering: New Applications / Ali Kaveh , Armin Dadras Eslamlou

Discusses the application of metaheuristic algorithms in a number of important optimization problems in civil engineering. ...

Lee mas
Modern Control Systems / Richard C. Dorf, Robert H. Bishop

Presents the structure of feedback control theory and to provide a sequence of exciting discoveries. The book demonstrates ...

Lee mas
Total Books: 101 - 120 /177