熱門搜尋

    【我要重新搜尋】

    您輸入的關鍵字: Ahmad-Reza

    分類(單選)
    配送方式(可複選)
    其他(可複選)
    ~

    搜尋結果共 27 筆, 頁數 1 / 1

    Robust Resource Allocation in Future Wireless Networks

    Robust Resource Allocation in Future Wireless Networks

    • 優惠價: 9599

    This book presents state-of-the-art research on robust resource allocation in current and future wir... more

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    • 優惠價: 5997

    As human activities moved to the digital domain, so did all the well-known malicious behaviors inclu... more

    Robust Resource Allocation in Future Wireless Networks

    Robust Resource Allocation in Future Wireless Networks

    • 優惠價: 9599

    This book presents state-of-the-art research on robust resource allocation in current and future wir... more

    Applied Cryptography and Network Security: 14th International Conference, Proceedings

    Applied Cryptography and Network Security: 14th International Conference, Proceedings

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the 14th International Conference on Applied Crypt... more

    Building Secure Defenses Against Code-reuse Attacks

    Building Secure Defenses Against Code-reuse Attacks

    • 優惠價: 3299

    This book provides an in-depth look at return-oriented programming attacks. It explores several conv... more

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    • 優惠價: 1799

    Today, embedded systems are used in many security-critical applications, from access control, electr... more

    Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23,

    Radio Frequency Identification: Security and Privacy Issues: 10th International Workshop, RFIDSec 2014, Oxford, UK, July 21-23,

    • 優惠價: 3299

    This book constitutes the refereed post-proceedings of the 10th Workshop on RFID Security and Privac... more

    Financial Cryptography and Data Security: 17th International Conference, Fc 2013, Okinawa, Japan, April 1-5, 2013, Revised Selec

    Financial Cryptography and Data Security: 17th International Conference, Fc 2013, Okinawa, Japan, April 1-5, 2013, Revised Selec

    • 優惠價: 3299

    This book constitutes the thoroughly refereed post-conference proceedings of the 17th International ... more

    The Baloch in Post Islamic Revolution Iran: A Political Study

    The Baloch in Post Islamic Revolution Iran: A Political Study

    • 優惠價: 3266
    Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings

    Trust and Trustworthy Computing: 4th International Conference, TRUST 2011, Pittsburgh, PA, USA, June 22-24, 2011, Proceedings

    • 優惠價: 3299
    Towards Hardware-Intrinsic Security: Foundations and Practice

    Towards Hardware-Intrinsic Security: Foundations and Practice

    • 優惠價: 10199
    Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

    Trust and Trustworthy Computing: Third International Conference, TRUST 2010, Berlin, Germany, June 21-23, 2010, Proceedings

    • 優惠價: 3299

    This volume contains the proceedings of the Third International Conference on Trust and Trustworthy ... more

    Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

    Information Hiding: 11th International Workshop, IH 2009, Darmstadt, Germany, June 8-10, 2009, Revised Selected Papers

    • 優惠價: 3299

    This book constitutes the thoroughly refereed post-workshop proceedings of the 11th International Wo... more

    Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

    Research in Cryptology: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

    • 優惠價: 3299

    This book constitutes the refereed proceedings of the Second Western European Workshop on Research i... more

    Naturally Occurring Chemicals Against Alzheimer’’s Disease

    Naturally Occurring Chemicals Against Alzheimer’’s Disease

    • 優惠價: 13500

    Naturally Occurring Chemicals against Alzheimer’s Disease offers a detailed discussion on the roles,... more

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    The Continuing Arms Race: Code-Reuse Attacks and Defenses

    • 優惠價: 4797
    Towards Hardware-Intrinsic Security: Foundations and Practice

    Towards Hardware-Intrinsic Security: Foundations and Practice

    • 優惠價: 10199
    Cryptology and Network Security: 11th International Conference, Cans 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

    Cryptology and Network Security: 11th International Conference, Cans 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings

    • 優惠價: 3299
    Anesthesia for everyone

    Anesthesia for everyone

    • 優惠價: 3261
    Anesthesia in a word

    Anesthesia in a word

    • 優惠價: 3558
    Stupid Thief and the Wise Mullah

    Stupid Thief and the Wise Mullah

    • 優惠價: 2370
    Biodiversity of fish freshwater ecosystem: Shadegan wetland

    Biodiversity of fish freshwater ecosystem: Shadegan wetland

    • 優惠價: 2370
    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    Physically Unclonable Functions (PUFs): Applications, Models, and Future Directions

    • 優惠價: 2100

    Today, embedded systems are used in many security-critical applications, from access control, electr... more

    In vitro culture of plant extinction of Zhumeria majdae

    In vitro culture of plant extinction of Zhumeria majdae

    • 優惠價: 3261
    Pharmacognosy and Molecular Pharmacognosy In Practice

    Pharmacognosy and Molecular Pharmacognosy In Practice

    • 優惠價: 2911
    Pro Spring Persistence With Hibernate

    Pro Spring Persistence With Hibernate

    • 優惠價: 1710

    Pro Spring Persistence with Hibernate is primarily for Spring developers and users who want to persi... more

    Trusted Computing-Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Tech

    Trusted Computing-Challenges and Applications: First International Conference on Trusted Computing and Trust in Information Tech

    • 優惠價: 2278

    搜尋推薦

    您可能感興趣的活動

    • 兌點瘋 OPEN POINT點數買最划算!