• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

E. George Loay - książki

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2946912]
• Literatura piękna
 [1852311]

  więcej...
• Turystyka
 [71421]
• Informatyka
 [150889]
• Komiksy
 [35717]
• Encyklopedie
 [23177]
• Dziecięca
 [617324]
• Hobby
 [138808]
• AudioBooki
 [1671]
• Literatura faktu
 [228371]
• Muzyka CD
 [400]
• Słowniki
 [2841]
• Inne
 [445428]
• Kalendarze
 [1545]
• Podręczniki
 [166819]
• Poradniki
 [480180]
• Religia
 [510412]
• Czasopisma
 [525]
• Sport
 [61271]
• Sztuka
 [242929]
• CD, DVD, Video
 [3371]
• Technologie
 [219258]
• Zdrowie
 [100961]
• Książkowe Klimaty
 [124]
• Zabawki
 [2341]
• Puzzle, gry
 [3766]
• Literatura w języku ukraińskim
 [255]
• Art. papiernicze i szkolne
 [7810]
Kategorie szczegółowe BISAC
 A Simplified Model for HF Radio Wave Propagation of Middle East Region A. Hadi, Khalid 9783639661262 Scholars' Press
A Simplified Model for HF Radio Wave Propagation of Middle East Region

A. Hadi, Khalid
In the present work, the analytical study for one of the modern theoretical international models which are used to predict the behavior of transferring radio waves among the transmitting/receiving stations and of affection of these waves by the atmosphere. The analytical study for the application of the REC533 international model has been made in order to reach for the conclusions that enable to forecast the frequencies that can maintain a semi-permanent reliable connection between the transmitting and receiving stations. In this study, Iraq has been adopted generally, whereas, Baghdad was...
In the present work, the analytical study for one of the modern theoretical international models which are used to predict the behavior of transferrin...
cena: 214,76
 Secret Image Sharing Based on Transform Coding T. Hashim Ashwaq                         E. George Loay 9783659335914 LAP Lambert Academic Publishing
Secret Image Sharing Based on Transform Coding

T. Hashim Ashwaq E. George Loay
The main challenges facing secure image sharing tasks are the increase of sharing volume and sharing-control flexibility. In this book a novel scheme based on transform coding has been developed to perform secret image sharing in the case when the secret image is a colored image with enough sharing control features and as minimum as possible shares sizes. The main signal decomposition attribute of the transform is utilized to divide the secret image into uncorrelated shares, and each share will be separately encrypted
The main challenges facing secure image sharing tasks are the increase of sharing volume and sharing-control flexibility. In this book a novel scheme ...
cena: 277,53
 SMS Encryption Using RC4 with Dynamic Key Based on Android Taha Ahmed Saja 9783659326745 LAP Lambert Academic Publishing
SMS Encryption Using RC4 with Dynamic Key Based on Android

Taha Ahmed Saja
SMS technology was not designed to transmit secure data; it does not provide built-in support for any security feature (e.g., authentication and confidentiality) between SMS communicators, in this book, a centralized secure messaging system (CSMS) is introduced. It allows the system clients to exchange highly secured messages exclusively via trusted third party (i.e. server). The main server contains a central database that holds clients' information. Depending on this information the server does the required message processing and forwards it to its final destination. The communication of...
SMS technology was not designed to transmit secure data; it does not provide built-in support for any security feature (e.g., authentication and confi...
cena: 246,14
 Methodologies to detect phishing emails Ghazi Mohammed Jameel Noor               E. George Loay 9783639703672 Scholars' Press
Methodologies to detect phishing emails

Ghazi Mohammed Jameel Noor E. George Loay
Phishing (also called brand spoofing or carding) is a technique for acquiring personal or sensitive information; e.g., credit card or bank account numbers and passwords often resulting in fraud; identify theft, and even financial loss. It has been around since 1996 but is becoming more common and more sophisticated. It's a form of cyber-crime that's growing faster than the ability of the police or courts to deal with it. The word "phishing" is simply a play on the word "fishing" - scammers drop email lures into the sea of Internet users, hoping to hook consumers personal information.The...
Phishing (also called brand spoofing or carding) is a technique for acquiring personal or sensitive information; e.g., credit card or bank account num...
cena: 358,23


Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia