Extends recent work on entrepreneurship in response to adverse events to explore entrepreneurial responses by people who ...
اقرأ المزيدThe book begins with introductory chapters on the etiology of intersex conditions, conceptual clarification, legal issues, ...
اقرأ المزيدWhether they involve excess, a decrease, or complete absence, problems of sexual desire drive women to consult sex therapists, ...
اقرأ المزيدFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
اقرأ المزيدThis book is a documentation wide range of disciplines and experience, looking of an inspiring evening of design and discussion.
اقرأ المزيدThis book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...
اقرأ المزيدThe theory of functional identities (FIs) is a relatively new one - the first results were published at the beginning of ...
اقرأ المزيدThis book a classic on the foundations of quantum theory. This view, which is essentially geometric and relies on the concept ...
اقرأ المزيدPositioning analysis penetrates beneath surface issues to their underlying psychological causes and social effects, with ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
اقرأ المزيدSince the debut of the original edition, the Handbook of Psychodiagnostic Testing has been an invaluable aid to students ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
اقرأ المزيدThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
اقرأ المزيدIndiscrete Thoughts gives a glimpse into a world that has seldom been described, that of science and technology as seen through ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
اقرأ المزيدhis volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...
اقرأ المزيدThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
اقرأ المزيدThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
اقرأ المزيدIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
اقرأ المزيد