Electronic Books

Total Books: 41 - 60 /103
Fast Software Encryption (vol. # 3557)

The Fast Software Encryption 2005 Workshop was the twelfth in a series of annual workshops on symmetric cryptography, sponsored ...

Lire la suite
Fast Software Encryption (vol. # 4047)

Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...

Lire la suite
Fast Software Encryption : 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers

Constitutes the thoroughly refereed proceedings of the 15th International Workshop on Fast Software Encryption, FSE 2008, ...

Lire la suite
Fault Diagnosis and Tolerance in Cryptography

The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...

Lire la suite
Forces, Growth and Form in Soft Condensed Matter: At the Interface between Physics and Biology

This volume comprises the proceedings of a NATO Advanced Study Institute held at Geilo, Norway, 24 March - 3 April 2003, ...

Lire la suite
NoIMG
Handbook of Visual Communication : Theory, Methods, and Media / Sheree Josephson, James Kelly, Ken Smith

Explores the key theoretical areas and research methods of visual communication. With chapters contributed by many of the ...

Lire la suite
High Performance Computing for Computational Science - VECPAR 2008 : 8th International Conference, Toulouse, France, June 24-27, 2008. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on High Performance ...

Lire la suite
Human Creation Between Reality and Illusion

Identifying quickly illusion with deception, we tend to oppose it to the reality of life. However, investigating in this ...

Lire la suite
Implants in the Aesthetic Zone: A Guide for Treatment of the Partially Edentulous Patient

This book concisely elucidates the science underlying implant treatment in the aesthetic zone in partially edentulous patients ...

Lire la suite
Information Security : 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings

This book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...

Lire la suite
Information Security Applications

Complete with Springer's trademark online files and updates, this fascinating text constitutes the refereed proceedings ...

Lire la suite
Information Security Applications

This book constitutes the thoroughly refereed post-proceedings of the 12th International Monterey Workshop on Networked Systems ...

Lire la suite
Information Security Practice and Experience (vol. # 3903)

his volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...

Lire la suite
Information Security, Practice and Experience

ISPEC is an annual conference that brings together researchers and practitioners to provide a con?uence of new information ...

Lire la suite
Information and Communications Security

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ...

Lire la suite
Injectable Fillers in Aesthetic Medicine

Fillers in Aesthetic Medicine is an excellent and comprehensive overview on the clinical use of fillers in aesthetic medicine. ...

Lire la suite
Innovations in Plastic and Aesthetic Surgery

The book is structured according to the major fields of plastic surgery, and the reader is thus offered insight into the ...

Lire la suite
NoIMG
Inside/outside Islamic art and architecture : a cartography of boundaries in and of the field

When we walk into a gallery, we have a fairly good idea where the building begins and ends; and inside, while observing a ...

Lire la suite
Intensive and Critical Care Medicine

The volume will provide an update on problems concerning respiration, cardiovascular medicine, monitoring, organizational ...

Lire la suite
Introduction to Cryptography

In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital ...

Lire la suite
Total Books: 41 - 60 /103