Electronic Books

Total Books: 161 - 180 /774
Computer Security – ESORICS 2006

This book constitutes the refereed proceedings of the 11th European Symposium on Research in Computer Security, ESORICS 2006. ...

Lire la suite
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lire la suite
Computer Viruses and Malware

This book discusses both the technical and human factors involved in computer viruses, worms, and anti-virus software. It ...

Lire la suite
Computer Viruses: from theory to applications

The purpose of this book is to propose a teaching approach to under- 1 stand what computer viruses really are and how they ...

Lire la suite
Computer Vision and Graphics

This book constitutes the refereed proceedings of the International Conference on Computer Vision and Graphics, ICCVG 2020, ...

Lire la suite
Computer and Information Sciences - ISCIS 2005

This book constitutes the refereed proceedings of the 20th International Symposium on Computer and Information Sciences, ...

Lire la suite
Computing Science, Communication and Security

This book constitutes revised selected papers of the Second International Conference on Computing Science, Communication ...

Lire la suite
Concurrent Zero-Knowledge

Zero-knowledge proofs are fascinating and extremely useful constructs. Their fascinating nature is due to their seemingly ...

Lire la suite
Constituents of Modern System-safety Thinking

Constituents of Modern System-safety Thinking contains the invited papers presented at the Thirteenth annual Safety-critical ...

Lire la suite
Constructing Ambient Intelligence : AmI 2007 Workshops Darmstadt, Germany, November 7-10, 2007 Revised Papers

This book constitutes the refereed proceedings of the workshops of the First European Conference on Ambient Intelligence, ...

Lire la suite
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3362)

History based access control and secure information flow The spec# programming system Mastering test generation from smart ...

Lire la suite
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices (vol. # 3956)

This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...

Lire la suite
Cooperative Design, Visualization, and Engineering

This book constitutes the proceedings of the 17th International Conference on Cooperative Design, Visualization, and Engineering, ...

Lire la suite
Core Java Volume I: Fundamentals, 12th ed. / Cay S. Horstmann

The definitive guide to writing robust, maintainable code. Whatever version of Java you are using—up to and including Java ...

Lire la suite
Countering Counterfeit Trade : Illicit Market Insights, Best-Practice Strategies, and Management Toolbox

The book constitutes a unique combination of in-depth insights into the counterfeit market, best-practice strategies, novel ...

Lire la suite
Critical Information Infrastructured Security

This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...

Lire la suite
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

Lire la suite
Critical Information Infrastructures

Starting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...

Lire la suite
Crop Biosecurity

Prevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...

Lire la suite
Total Books: 161 - 180 /774