Results
|
101.
|
|
Image from Amazon.com
|
|
|
102.
|
|
Image from Amazon.com
|
|
|
103.
|
|
Image from Amazon.com
|
|
|
104.
|
|
Image from Amazon.com
|
|
|
105.
|
|
Image from Amazon.com
|
|
|
106.
|
|
Image from Amazon.com
|
Computer Network Security [electronic resource] : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 24-28, 2005. Proceedings / edited by Vladimir Gorodetsky, Igor Kotenko, Victor Skormin. by Series: Lecture Notes in Computer Science ; 3685Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005
In:
Springer eBooks
Availability: No items available.
|
|
107.
|
|
Image from Amazon.com
|
|
|
108.
|
|
Image from Amazon.com
|
Digital Watermarking [electronic resource] : 4th International Workshop, IWDW 2005, Siena, Italy, September 15-17, 2005. Proceedings / edited by Mauro Barni, Ingemar Cox, Ton Kalker, Hyoung-Joong Kim. by Series: Lecture Notes in Computer Science ; 3710Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005
In:
Springer eBooks
Availability: No items available.
|
|
109.
|
|
Image from Amazon.com
|
|
|
110.
|
|
Image from Amazon.com
|
|
|
111.
|
|
Image from Amazon.com
|
|
|
112.
|
|
Image from Amazon.com
|
Information and Communications Security [electronic resource] : 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005. Proceedings / edited by Sihan Qing, Wenbo Mao, Javier López, Guilin Wang. by Series: Lecture Notes in Computer Science ; 3783Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005
In:
Springer eBooks
Availability: No items available.
|
|
113.
|
|
Image from Amazon.com
|
|
|
114.
|
|
Image from Amazon.com
|
|
|
115.
|
|
Image from Amazon.com
|
|
|
116.
|
|
Image from Amazon.com
|
Embedded and Ubiquitous Computing – EUC 2005 Workshops [electronic resource] : EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005. Proceedings / edited by Tomoya Enokido, Lu Yan, Bin Xiao, Daeyoung Kim, Yuanshun Dai, Laurence T. Yang. by Series: Lecture Notes in Computer Science ; 3823Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005
In:
Springer eBooks
Availability: No items available.
|
|
117.
|
|
Image from Amazon.com
|
Cryptology and Network Security [electronic resource] : 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005. Proceedings / edited by Yvo G. Desmedt, Huaxiong Wang, Yi Mu, Yongqing Li. by Series: Lecture Notes in Computer Science ; 3810Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005
In:
Springer eBooks
Availability: No items available.
|
|
118.
|
|
Image from Amazon.com
|
|
|
119.
|
|
Image from Amazon.com
|
|
|
120.
|
|
Image from Amazon.com
|
|