Libros sobre el tema "Mathematical data- Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores mejores libros para su investigación sobre el tema "Mathematical data- Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore libros sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Kopczuk, Wojciech. Uncovering the American dream: Inequality and mobility in social security earnings data since 1937. Cambridge, Mass: National Bureau of Economic Research, 2007.
Buscar texto completoKopczuk, Wojciech. Uncovering the american dream: Inequality and mobility in social security earnings data since 1937. Cambridge, MA: National Bureau of Economic Research, 2007.
Buscar texto completoÖzyer, Tansel. Mining Social Networks and Security Informatics. Dordrecht: Springer Netherlands, 2013.
Buscar texto completoBrand, Ruth. Anonymität von Betriebsdaten: Verfahren zur Erfassung und Massnahmen zur Verringerung des Reidentifikationsrisikos. Nürnberg: Institut für Arbeitsmarkt- und Berufsforschung der Bundesanstalt für Arbeit, 2000.
Buscar texto completoIgor, Kotenko y Skormin Victor A. 1946-, eds. Computer network security: 6th international conference on mathematical methods, models and architectures for computer network security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012 : proceedings. Heidelberg: Springer, 2012.
Buscar texto completoDiergardt, Martin. Modeling scenarios for analyzing the risks of complex computer based information systems. Berlin: dissertation.de, 2007.
Buscar texto completoKott, Alexander. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Boston, MA: Springer Science+Business Media, LLC, 2010.
Buscar texto completoTorra, Vicenç. Modeling Decisions for Artificial Intelligence: 9th International Conference, MDAI 2012, Girona, Catalonia, Spain, November 21-23, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Buscar texto completoAggarwal, Charu C. Outlier Analysis. New York, NY: Springer New York, 2013.
Buscar texto completoAmy, Felty y SpringerLink (Online service), eds. Interactive Theorem Proving: Third International Conference, ITP 2012, Princeton, NJ, USA, August 13-15, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Buscar texto completoJhala, Ranjit. Programming Languages and Systems: 10th Asian Symposium, APLAS 2012, Kyoto, Japan, December 11-13, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Buscar texto completoV, Dasarathy Belur y Society of Photo-optical Instrumentation Engineers., eds. Data mining, intrusion detection, information assurance, and data networks security 2007: 10 April 2007, Orlando, Florida, USA. Bellingham, Wash: SPIE, 2007.
Buscar texto completoMusaji, Yusufali F. Auditing and security: AS/400, NT, Unix, networks, and disaster recovery plans. New York: John Wiley & Sons, 2001.
Buscar texto completoSakiyama, Kazuo. Security of block ciphers: From algorithm design to hardware implementation. Chichester, West Sussex: John Wiley & Sons Inc., 2015.
Buscar texto completoYanlin, Qin, ed. Xin xi an quan shu xue ji chu. Beijing Shi: Guo fang gong ye chu ban she, 2009.
Buscar texto completoDamgrd, Ivan Bjerre. Lectures on Data Security: Modern Cryptology in Theory and Practice. Berlin: Springer-Verlag Berlin Heidelberg, 1999.
Buscar texto completoGrigor'ev, Anatoliy, Evgeniy Isaev y Pavel Tarasov. Transfer, storage and processing of large volumes of scientific data. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1073525.
Texto completo1945-, Clark Andrew y Lynas David 1964-, eds. Enterprise security architecture: A business-driven approach. San Francisco: CMP Books, 2005.
Buscar texto completoBashkatov, Aleksandr. Simulation of accidents on route transport. ru: INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1860140.
Texto completoHanaoka, Goichiro. Advances in Information and Computer Security: 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012.
Buscar texto completoRokne, Jon, Tansel Özyer y Zeki Erdem. Mining Social Networks and Security Informatics. Springer, 2013.
Buscar texto completoRokne, Jon, Tansel Özyer, Zeki Erdem y Suheil Khoury. Mining Social Networks and Security Informatics. Springer, 2013.
Buscar texto completoRokne, Jon, Tansel Özyer, Zeki Erdem y Suheil Khoury. Mining Social Networks and Security Informatics. Springer, 2014.
Buscar texto completo(Editor), Ashley Morris y Svitlana Kokhan (Editor), eds. Geographic Uncertainty in Environmental Security (NATO Science for Peace and Security Series C: Environmental Security). Springer, 2007.
Buscar texto completoKott, Alexander y Gary Citrenbaum. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer, 2010.
Buscar texto completoZhu, Hong y Clive Blackwell. Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Springer, 2014.
Buscar texto completoCyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Springer, 2016.
Buscar texto completoCyberpatterns: Unifying Design Patterns with Security and Attack Patterns. Springer, 2014.
Buscar texto completoKott, Alexander y Gary Citrenbaum. Estimating Impact: A Handbook of Computational Methods and Models for Anticipating Economic, Social, Political and Security Effects in International Interventions. Springer, 2014.
Buscar texto completoTakagi, Tsuyoshi. International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer Nature, 2021.
Buscar texto completoTakagi, Tsuyoshi, Noboru Kunihiro, Masato Wakayama, Keisuke Tanaka y Kazufumi Kimoto. International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer Singapore Pte. Limited, 2020.
Buscar texto completoTakagi, Tsuyoshi, Noboru Kunihiro, Masato Wakayama, Keisuke Tanaka y Kazufumi Kimoto. International Symposium on Mathematics, Quantum Theory, and Cryptography: Proceedings of MQC 2019. Springer Singapore Pte. Limited, 2021.
Buscar texto completoInformation Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Buscar texto completoScholz, Paul. Information Security: Cyberattacks, Data Breaches and Security Controls. Nova Science Publishers, Incorporated, 2019.
Buscar texto completoTorra, Vicenç, Yasuo Narukawa, Aoi Honda y Sozo Inoue. Modeling Decisions for Artificial Intelligence: 14th International Conference, MDAI 2017, Kitakyushu, Japan, October 18-20, 2017, Proceedings. Springer, 2017.
Buscar texto completoTorra, Vicenç, Yasuo Narukawa, Gabriella Pasi y Marco Viviani. Modeling Decisions for Artificial Intelligence: 16th International Conference, MDAI 2019, Milan, Italy, September 4–6, 2019, Proceedings. Springer, 2019.
Buscar texto completoTorra, Vicenç y Torra Narukawa. Modeling Decisions for Artificial Intelligence: 12th International Conference, MDAI 2015, Skövde, Sweden, September 21-23, 2015, Proceedings. Springer, 2015.
Buscar texto completoTorra, Vicenç y Yasuo Narukawa. Modeling Decisions for Artificial Intelligence: 19th International Conference, MDAI 2022, Sant Cugat, Spain, August 30-September 2, 2022, Proceedings. Springer International Publishing AG, 2022.
Buscar texto completoTorra, Vicenç, Yasuo Narukawa, Isabel Aguiló y Manuel González-Hidalgo. Modeling Decisions for Artificial Intelligence: 15th International Conference, MDAI 2018, Mallorca, Spain, October 15–18, 2018, Proceedings. Springer, 2018.
Buscar texto completoTorra, Vicenç, Yasuo Narukawa y Yasunori Endo. Modeling Decisions for Artificial Intelligence: 11th International Conference, MDAI 2014, Tokyo, Japan, October 29-31, 2014, Proceedings. Springer, 2014.
Buscar texto completoAgell, Núria, Vicenç Torra, Yasuo Narukawa y Jordi Nin. Modeling Decisions for Artificial Intelligence: 17th International Conference, MDAI 2020, Sant Cugat, Spain, September 2-4, 2020, Proceedings. Springer International Publishing AG, 2020.
Buscar texto completoTorra, Vicenç y Yasuo Narukawa. Modeling Decisions for Artificial Intelligence: 18th International Conference, MDAI 2021, Umeå, Sweden, September 27-30, 2021, Proceedings. Springer International Publishing AG, 2021.
Buscar texto completoTorra, Vicenç, Yasuo Narukawa, Guillermo Navarro-Arribas y Cristina Yañez. Modeling Decisions for Artificial Intelligence: 13th International Conference, MDAI 2016, Sant Julià de Lòria, Andorra, September 19-21, 2016. Proceedings. Springer, 2016.
Buscar texto completoTorra, Vicenç, Yasuo Narukawa y Yasunori Endo. Modeling Decisions for Artificial Intelligence: 11th International Conference, MDAI 2014, Tokyo, Japan, October 29-31, 2014, Proceedings. Springer, 2014.
Buscar texto completoAlazab, Mamoun y Maanak Gupta. Trust, Security and Privacy for Big Data. CRC Press LLC, 2022.
Buscar texto completoAlazab, Mamoun y Maanak Gupta. Trust, Security and Privacy for Big Data. Taylor & Francis Group, 2022.
Buscar texto completoAlazab, Mamoun y Maanak Gupta. Trust, Security and Privacy for Big Data. CRC Press LLC, 2022.
Buscar texto completoAlazab, Mamoun y Maanak Gupta. Trust, Security and Privacy for Big Data. Taylor & Francis Group, 2022.
Buscar texto completoAlazab, Mamoun y Maanak Gupta. Trust, Security and Privacy for Big Data. CRC Press LLC, 2022.
Buscar texto completoOutlier Analysis. Springer, 2017.
Buscar texto completo