The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
اقرأ المزيدThis book presents new approaches for researching values as they are performed or materialized. Values have been an important ...
اقرأ المزيدIt provides the tools for effective human resource management, summarized in the following seven success factors: demographic-oriented ...
اقرأ المزيدPeople use software and other technical systems in many ways, and a considerable amount of time and energy may be spent integrating ...
اقرأ المزيدResponsibility and Dependable Systems is the first book to examine the relationship between responsibility and system dependability. ...
اقرأ المزيدSustainability and procurement Sustainable sourcing Responsible sourcing Purchasing Category management Operating models ...
اقرأ المزيدIn Retargetable Processor System Integration into Multi-Processor System-on-Chip Platforms, such originally independent approaches ...
اقرأ المزيدThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
اقرأ المزيدMcInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
اقرأ المزيدSoftware reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
اقرأ المزيدAt a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers ...
اقرأ المزيدThe main goal of this book is to make the reader familiar with the complexity and multi-dimensionality of the subject RISK, ...
اقرأ المزيدEconomic growth and globalisation create traffic growth, leading to congestion, which again increases travel times and costs. ...
اقرأ المزيدThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
اقرأ المزيدFor operators of nuclear research facilities, it is of particular importance to investigate minor incidents. The nuclear ...
اقرأ المزيدSafety is one of the most important issues today. Recent international standards such as ISO and IEC have consistently advocated ...
اقرأ المزيدThis is a pioneering work. Recent disasters such as the tsunami disaster continue to demonstrate Professor Allinson’s thesis ...
اقرأ المزيدThis book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
اقرأ المزيدThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
اقرأ المزيدNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
اقرأ المزيد