Ieee Security 2016

IEEE Security and Privacy 2016 Full Year Collection  Magazines

Posted by AvaxGenius at Jan. 12, 2017
IEEE Security and Privacy 2016 Full Year Collection

IEEE Security and Privacy 2016 Full Year Collection
English | True PDF | 6 Issues | 39.40 MB

IEEE Security & Privacy provides a unique combination of research articles, case studies, tutorials, and regular columns covering diverse aspects of information assurance such as legal issues, privacy concerns, tools to help secure information, attack analysis , trends, and new developments in hardware and software.

IEEE Security and Privacy - November/December 2016  Magazines

Posted by AvaxGenius at Jan. 11, 2017
IEEE Security and Privacy - November/December 2016

IEEE Security and Privacy - November/December 2016
English | True PDF | 102 Pages | 4.43 MB

IEEE Security and Privacy - September/October 2016  Magazines

Posted by AvaxGenius at Jan. 11, 2017
IEEE Security and Privacy - September/October 2016

IEEE Security and Privacy - September/October 2016
English | True PDF | 102 Pages | 8.06 MB

IEEE Security and Privacy - July/August 2016  Magazines

Posted by AvaxGenius at Jan. 11, 2017
IEEE Security and Privacy - July/August 2016

IEEE Security and Privacy - July/August 2016
English | True PDF | 94 Pages | 6.54 MB

Trustworthy Cloud Computing (Wiley - IEEE)  eBooks & eLearning

Posted by AlenMiler at April 3, 2019
Trustworthy Cloud Computing (Wiley - IEEE)

Trustworthy Cloud Computing (Wiley - IEEE) by Vladimir O. Safonov
English | February 29, 2016 | ISBN: 1119113504 | 352 pages | AZW3 | 16 Mb

VLSI-SoC: Design for Reliability, Security, and Low Power  eBooks & eLearning

Posted by Jeembo at June 13, 2017
VLSI-SoC: Design for Reliability, Security, and Low Power

VLSI-SoC: Design for Reliability, Security, and Low Power: 23rd IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2015, Daejeon, Korea, October 5-7, 2015, Revised Selected Papers by Youngsoo Shin, Chi Ying Tsui, Jae-Joon Kim, Kiyoung Choi, Ricardo Reis
English | 2016 | ISBN: 331946096X | 223 Pages | PDF | 49.8 MB

This book contains extended and revised versions of the best papers presented at the 23rd IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2015, held in Daejeon, Korea, in October 2015.

Recent Advances in Computational Intelligence in Defense and Security  eBooks & eLearning

Posted by insetes at Nov. 5, 2021
Recent Advances in Computational Intelligence in Defense and Security

Recent Advances in Computational Intelligence in Defense and Security By Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass (eds.)
2016 | 752 Pages | ISBN: 3319264486 | PDF | 21 MB

Cyber-Risk Informatics: Engineering Evaluation with Data Science  eBooks & eLearning

Posted by roxul at May 13, 2017
Cyber-Risk Informatics: Engineering Evaluation with Data Science

Mehmet Sahinoglu, "Cyber-Risk Informatics: Engineering Evaluation with Data Science"
English | 2016 | ISBN: 1119087511 | 560 pages | PDF | 25 MB

Cyber-Risk Informatics: Engineering Evaluation with Data Science (repost)  eBooks & eLearning

Posted by interes at Feb. 9, 2019
Cyber-Risk Informatics: Engineering Evaluation with Data Science (repost)

Cyber-Risk Informatics: Engineering Evaluation with Data Science by Mehmet Sahinoglu
English | 2016 | ISBN: 1119087511 | 560 pages | EPUB | 116 MB

Edge Intelligence in the Making: Optimization, Deep Learning, and Applications  eBooks & eLearning

Posted by Underaglassmoon at Dec. 2, 2020
Edge Intelligence in the Making: Optimization, Deep Learning, and Applications

Edge Intelligence in the Making: Optimization, Deep Learning, and Applications
Morgan & Claypool | English | 2021 | ISBN-10: 1681739909 | 233 pages | PDF | 19.22 MB

by Sen Lin (Author), Zhi Zhou (Author), Zhaofeng Zhang (Author), Xu Chen (Author), Junshan Zhang (Author)
With the explosive growth of mobile computing and Internet of Things (IoT) applications, as exemplified by AR/VR, smart city, and video/audio surveillance, billions of mobile and IoT devices are being connected to the Internet, generating zillions of bytes of data at the network edge