These issues are addressed in the present book: First, a model of customer loyalty and its determinants is developed, which ...
اقرأ المزيد
Janine Frauendorf analyzes how customer processes can be used to optimize the overall service process. In this context, the ...
اقرأ المزيد
The third in the series on Stakeholder Management, this volume presents a wide array of case studies to demonstrate how Stakeholder ...
اقرأ المزيد
Lupus erythematosus is a chronic inflammatory autoimmune disease characterized by a wide spectrum of manifestations with ...
اقرأ المزيد
Cutting Tool Technology provides a comprehensive guide to the latest developments in the use of cutting tool technology. ...
اقرأ المزيد
This volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
اقرأ المزيد
Humans can be exposed to cyanobacterial toxins by drinking water that contains the toxins, swimming in water that contains ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
اقرأ المزيد
Part 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
اقرأ المزيدFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
اقرأ المزيدThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
اقرأ المزيد
In this concise yet comprehensive textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems ...
اقرأ المزيد
Covers the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement ...
اقرأ المزيد
This book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
اقرأ المزيد
Cyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
اقرأ المزيد
This book is, perhaps, the first attempt to present a unified exposition of the subject and methodology of cybernetical physics ...
اقرأ المزيد
Written by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information ...
اقرأ المزيدImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
اقرأ المزيدThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
اقرأ المزيد