This book constitutes the refereed proceedings of the5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), ...
اقرأ المزيدThis book documents myriads of ways community-based climate change adaptation and resilience programs are being implemented ...
اقرأ المزيدOffers critical insights into the thriving international field of community indicators, incorporating the experiences of ...
اقرأ المزيدOver the past decade, community schools similar to those supported by Save the Children have been established in many developing ...
اقرأ المزيدThis book provides new thinking on scientific identity formation. It thoroughly interrogates the concepts of community and ...
اقرأ المزيدThe book explores five major topics: state-society relations; environmental non-governmental organizations (ENGOs); Green ...
اقرأ المزيدIn the twenty-first century, applications in medicine and engineering must acquire greater safety and flexibility if they ...
اقرأ المزيدThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...
اقرأ المزيدThe Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP) is a forum bringing together researchers ...
اقرأ المزيدContaminated Soils Volume 9 contains 38 technical papers, covering a wide range of environmental issues. Volume discussion ...
اقرأ المزيدThe search for the best possible performance is inherent in human nature. Individuals, enterprises and governments all seek ...
اقرأ المزيدHigher education finances lie at the crossroads in many Western countries. On the one hand, the surging demand of the past ...
اقرأ المزيدOne key outcome of this book is a better understanding of the independent contributions from across the international community ...
اقرأ المزيدFighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
اقرأ المزيدAn unacknowledged key feature of East Asian FTA diplomacy is the region's active cross-regional preferential trading relations. ...
اقرأ المزيدModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
اقرأ المزيدCyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
اقرأ المزيدImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
اقرأ المزيدThis book provides statistical tools for evaluating the effects of public policies advocated by governments and public institutions. ...
اقرأ المزيد