Electronic Books

Total Books: 801 - 820 /910
Technologies for Advanced Heterogeneous Networks

The Asian Internet Engineering Conference (AINTEC) brings together researchers and engineers interested in practical and ...

Lire la suite
Technologies for E-Services

This book constitutes the refereed proceedings of the 2002 VLDB workshop on Technologies for E-Services (VLDB-TES 02) isthe ...

Lire la suite
Technologies for E-Services (vol. # 3324)

It featured the presen- tion of 12 regular papers, focused on major aspects of e-business solutions. In addition, the workshop ...

Lire la suite
Terahertz Frequency Detection and Identification of Materials and Objects

The technology of terahertz detection has largely been developed around expensive and bulky femtosecond laser systems but, ...

Lire la suite
NoIMG
Terrestrial Trunked Radio - Tetra

Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to ...

Lire la suite
Test and Analysis of Web Services

The service-oriented approach has become more and more popular, now allowing highly integrated and yet heterogeneous applications. ...

Lire la suite
Testing Software and Systems : 32nd IFIP WG 6.1 International Conference, ICTSS 2020, Naples, Italy, December 9–11, 2020, Proceedings

This book constitutes the refereed proceedings of the 32nd IFIP WG 6.1 International Conference on Testing Software and Systems, ...

Lire la suite
Testing of Communicating Systems (vol. # 3964)

This volume contains the proceedings of the 18th IFIP International Conferenceon Testing Communicating Systems (TestCom 2006). ...

Lire la suite
Testing of Software and Communicating Systems

This book constitutes the refereed proceedings of the 19th IFIP TC 6/WG 6.1 International Conference on Testing Communicating ...

Lire la suite
The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy

This book presents the proceedings of The 2020 International Conference on Machine Learning and Big Data Analytics for IoT ...

Lire la suite
The Art of Attack: Attacker Mindset for Security Professionals / Maxie Reynolds

Untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and ...

Lire la suite
The Climate-Smart Agriculture Papers

This volume shares new data relating to Climate-Smart Agriculture (CSA), with emphasis on experiences in Eastern and Southern ...

Lire la suite
The Coupling of Safety and Security Exploring Interrelations in Theory and Practice

This book back at how safety and security have developed in hazardous technologies and activities, explaining what has become ...

Lire la suite
The Cryptocurrency Revolution : Finance in the Age of Bitcoin, Blockchains and Tokens / Rhian Lewis

Pulls together the most important takeaways from the growth of cryptocurrencies and blockchains, looking at their potential ...

Lire la suite
The Definitive Guide to Stellent Content Server Development

The Definitive Guide to Stellent Content Server Development is the most complete book available for this enterprise content ...

Lire la suite
The Ethics of Cybersecurity

This book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses ...

Lire la suite
The Evolution of Civil-Military Relations in South East Europe

It is notorious that the evolution of civil-military relations and the security sector reform in South East Europe has to ...

Lire la suite
NoIMG
The Future of Financial Systems in the Digital Age : Perspectives from Europe and Japan / Markus HeckelFranz Waldenberger

The increasing capacity of digital networks and computing power, together with the resulting connectivity and availability ...

Lire la suite
The Hindu Kush Himalaya Assessment

This volume is the first comprehensive assessment of the Hindu Kush Himalaya (HKH) region. It comprises important scientific ...

Lire la suite
The Huawei and Snowden Questions

This book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted ...

Lire la suite
Total Books: 801 - 820 /910