The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
اقرأ المزيدThis book covers a variety of well known topics of interest to practitioners in industry and research scientists. The range ...
اقرأ المزيدCharity Law & Social Policy explores contemporary law, policy and practice in a range of modern common law nations. It does ...
اقرأ المزيدIn a unique, single volume, this highly versatile text/reference introduces readers to the importance of channel coding (error-correcting ...
اقرأ المزيدThis book offers an analytical presentation of how Europe has created its own version of collective actions. In the last ...
اقرأ المزيدThis book provides the first-ever comparative study on criminal policy concerning the illicit trade of tobacco, conducted ...
اقرأ المزيدThis book includes 23 papers dealing with the impact of modern information and communication technologies that support a ...
اقرأ المزيدDo small developing economies, or SDEs, need a specific competition policy to create competitive markets? Against the backdrop ...
اقرأ المزيدThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 27th International Conference on Conceptual Modeling, ER 2008, held ...
اقرأ المزيدThis study sheds light on the efficiency of corporate control allocation in Chinese listed firms. Using a panel data set ...
اقرأ المزيدThe book focuses on the situation in a number of Western regions (notably the USA, the UK, and the EU and its Member States). ...
اقرأ المزيدProvides an in-depth introduction to crisis management and leadership in SMEs, as well as methods, approaches and cases against ...
اقرأ المزيدUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
اقرأ المزيدThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
اقرأ المزيدThis book presented signatures, network security, secure keyword search and private information retrieval, public key encryption, ...
اقرأ المزيدConstitutes the refereed proceedings of the Conference on Cryptology and Network Security, 2005. This book covers cryptanalysis, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
اقرأ المزيدThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
اقرأ المزيد