Search alternatives:
"mail" » "main", "mall"

1
by Desoky, Abdelrahman
Published 2012
CRC Press
Table of Contents: ... Steganography Methodology -- Chapter 9: Headstega: E-Mail-Headers-Based Steganography Methodology -- Chapter 10...

2
by Omondi, Amos R.
Published 2020
Springer International Publishing
... mail, financial transactions, medical-record keeping, government affairs, social media etc. - are based...

3
Published 2019
Springer International Publishing
Table of Contents: ...Cojocaru, M. G., Thommes, E. W., and Gillies, S: A Model of Residential Mail Delivery by Drones...

4
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... -- Evaluation of Concept Lattices in a Web-Based Mail Browser -- D-SIFT: A Dynamic Simple Intuitive FCA Tool...

5
Published 2003
Springer Berlin Heidelberg
Table of Contents: ...-mail Messages...

6
by Paar, Christof, Pelzl, Jan
Published 2010
Springer Berlin Heidelberg
... communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs...

7
Published 1999
Springer Berlin Heidelberg
Table of Contents: ...-mail Messages Combining Content-Based and Sociological Filtering with User-Stereotypes -- Interactive...

8
by Fischer, Stephan, Steinacker, Achim, Bertram, Reinhard, Steinmetz, Ralf
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... Datenübertragung -- 7.1 Einleitung -- 7.2 Absicherung von ftp-Verbindungen -- 7.3 Absicherung von E-Mails -- 7.4...

9
Published 2003
Springer Berlin Heidelberg
... formats, including e-mail, chat records, SMS messages, videoconferencing records. Not all multimedia data...

10
Published 1994
Springer Berlin Heidelberg
Table of Contents: ... teleservice incorporating mail -- A zoomable DBMS for brain structure, function and behavior -- Combining...

11
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... of Distributed Top-k Queries -- Evaluating Mid-(k, n) Queries Using B?+?-Tree -- On Effective E-mail...