Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Lotus Unleashed
  • Language: en
  • Pages: 232

The Lotus Unleashed

During the Vietnam War, Vietnamese Buddhist peace activists made extraordinary sacrifices -- including self-immolation -- to try to end the fighting. They hoped to establish a neutralist government that would broker peace with the Communists and expel the Americans. Robert J. Topmiller explores South Vietnamese attitudes toward the war, the insurgency, and U.S. intervention, and lays bare the dissension within the U.S. military. The Lotus Unleashed is one of the few studies to illuminate the impact of internal Vietnamese politics on U.S. decision-making and to examine the power of a nonviolent movement to confront a violent superpower.

Information Security
  • Language: en
  • Pages: 471

Information Security

  • Type: Book
  • -
  • Published: 2017-11-13
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 20th International Conference on Information Security, ISC 2017, held in Ho Chi Minh City, Vietnam, in November 2017. The 25 revised full papers presented were carefully reviewed and selected from 97 submissions. The papers are organized in topical sections on symmetric cryptography, post-quantum cryptography, public-key cryptography, authentication, attacks, privacy, mobile security, software security, and network and system security.

Directory of Officials of the Socialist Republic of Vietnam
  • Language: en
  • Pages: 228

Directory of Officials of the Socialist Republic of Vietnam

  • Type: Book
  • -
  • Published: 1980
  • -
  • Publisher: Unknown

None

Rough Sets
  • Language: en
  • Pages: 676

Rough Sets

  • Type: Book
  • -
  • Published: 2018-08-14
  • -
  • Publisher: Springer

This LNAI 1103 constitutes the proceedings of the International Joint Conference on Rough Sets, IJCRS 2018, held in Quy Nhon, Vietnam, in August 2018. The 40 full papers presented together with 5 short papers were carefully reviewed and selected from 61 submissions. The IJCRS conferences aim at bringing together experts from universities and research centers as well as the industry representing fields of research in which theoretical and applicational aspects of rough set theory already find or may potentially find usage.

Brushing the World Famous
  • Language: en
  • Pages: 189

Brushing the World Famous

  • Type: Book
  • -
  • Published: 2005
  • -
  • Publisher: iUniverse

This is an autobiography which covers a young and adult age full of stories about fighting in wars, hunting, fishing in the wild, life in a coffee plantation, a career both national and international, with cooperation with many leaders of the world. A span of history about the relations between Vietnam, France, the U.S., Japan and many European and Asian countries, not known neither to the Vietnam public, nor to the outside world. Many secret stories.

Advanced Computational Methods for Knowledge Engineering
  • Language: en
  • Pages: 417

Advanced Computational Methods for Knowledge Engineering

  • Type: Book
  • -
  • Published: 2015-05-04
  • -
  • Publisher: Springer

This volume contains the extended versions of papers presented at the 3rd International Conference on Computer Science, Applied Mathematics and Applications (ICCSAMA 2015) held on 11-13 May, 2015 in Metz, France. The book contains 5 parts: 1. Mathematical programming and optimization: theory, methods and software, Operational research and decision making, Machine learning, data security, and bioinformatics, Knowledge information system, Software engineering. All chapters in the book discuss theoretical and algorithmic as well as practical issues connected with computation methods & optimization methods for knowledge engineering and machine learning techniques.

Ictacs 2006 - Proceedings Of The First International Conference On Theories And Applications Of Computer Science 2006
  • Language: en
  • Pages: 274

Ictacs 2006 - Proceedings Of The First International Conference On Theories And Applications Of Computer Science 2006

This volume brings together many contributions from leading research scientists, engineers and practitioners in computer science. Selected by program committee members, the topics describe innovative research and new technologies in the following areas of interest: image processing, computer vision and pattern recognition; computational linguistics and natural language processing; artificial intelligence, machine learning and algorithms; software engineering; computer networks and security; and bioinformatics.

WITS 2020
  • Language: en
  • Pages: 1139

WITS 2020

This book presents peer-reviewed articles from the 6th International Conference on Wireless Technologies, Embedded and Intelligent Systems (WITS 2020), held at Fez, Morocco. It presents original research results, new ideas and practical lessons learnt that touch on all aspects of wireless technologies, embedded and intelligent systems. WITS is an international conference that serves researchers, scholars, professionals, students and academicians looking to foster both working relationships and gain access to the latest research results. Topics covered include Telecoms & Wireless Networking Electronics & Multimedia Embedded & Intelligent Systems Renewable Energies.

Future Information Technology, Application, and Service
  • Language: en
  • Pages: 762

Future Information Technology, Application, and Service

This book is proceedings of the 7th FTRA International Conference on Future Information Technology (FutureTech 2012). The topics of FutureTech 2012 cover the current hot topics satisfying the world-wide ever-changing needs. The FutureTech 2012 is intended to foster the dissemination of state-of-the-art research in all future IT areas, including their models, services, and novel applications associated with their utilization. The FutureTech 2012 will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in this area. In addition, the conference will publish high quality papers which are closely related to the various theories, modeling, and p...

Mobile and Wireless Networks Security
  • Language: en
  • Pages: 88

Mobile and Wireless Networks Security

Wireless and mobile networks have undergone a tremendous evolution since their start. This was mainly motivated by the need for connectivity everywhere, as exemplified by the philosophy of OC always onOCO access. Mobile telephony was the first need felt by users, followed by the need for mobile Internet applications. Mobile telecommunications networks were the first concretization of mobile telephony, followed by a set of wireless technologies with or without embedded mobility and with or without infrastructure. Obviously, this large deployment of services over mobile and wireless networks is not easy from a network security point of view. This book presents selected up-to-date research on security in wireless and mobile environments, mainly WiFi and self-organized networks such as ad-hoc networks. The selected research work was peer-reviewed and presented at the Mobile and Wireless Networks Security (MWNS) 2008 Workshop in Singapore.