9783642352638-3642352634-Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST ... in Computer and Information Science, 339)

Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST ... in Computer and Information Science, 339)

FREE US shipping
Buy

From $16.50

Summary

Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST ... in Computer and Information Science, 339) (ISBN-13: 9783642352638 and ISBN-10: 3642352634), written by authors Tai-hoon Kim, Byeong-Ho Kang, Thanos Vasilakos, Muhammad Khurram Khan, Kirk P. Arnett, Adrian Stoica, Javier Garcia Villalba, Wai-chi Fang, was published by Springer in 2012. With an overall rating of 4.4 stars, it's a notable title among other Information Management (Processes & Infrastructure, Computer Science, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Cloud Computing, Networking & Cloud Computing, History & Culture, Management & Leadership) books. You can easily purchase or rent Computer Applications for Security, Control and System Engineering: International Conferences, SecTech, CA, CES3 2012, Held in Conjunction with GST ... in Computer and Information Science, 339) (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the International Conferences on Security Technology, SecTech 2012, on Control and Automation, CA 2012, and CES-CUBE 2012, the International Conference on Circuits, Control, Communication, Electricity, Electronics, Energy, System, Signal and Simulation; all held in conjunction with GST 2012 on Jeju Island, Korea, in November/December 2012. ~The papers presented were carefully reviewed and selected from numerous submissions and focus on the various aspects of security technology, and control and automation, and circuits, control, communication, electricity, electronics, energy, system, signal and simulation.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book