Humans can be exposed to cyanobacterial toxins by drinking water that contains the toxins, swimming in water that contains ...
اقرأ المزيد
This book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
اقرأ المزيدThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
اقرأ المزيد
This book provides new insight into Markovian dependence via the cycle decompositions. It presents a systematic account of ...
اقرأ المزيد
This book provides new insight into Markovian dependence via the cycle decompositions. It presents a systematic account of ...
اقرأ المزيد
Cyclotomic fields have always occupied a central place in number theory, and the so called "main conjecture" on cyclotomic ...
اقرأ المزيد
Cyclotomic fields have always occupied a central place in number theory, and the so called "main conjecture" on cyclotomic ...
اقرأ المزيد
Its objective is to present various numerical methods for solving certain mathematical problems on the computer that cannot ...
اقرأ المزيد
D-modules continues to be an active area of stimulating research in such mathematical areas as algebra, analysis, differential ...
اقرأ المزيد
The structural and functional importance of the correct patterns of DNA methylation in all parts of a mammalian genome is ...
اقرأ المزيد
DNA Repair and Human Disease highlights the molecular complexities of a few well-known human hereditary disorders that arise ...
اقرأ المزيد
This book offers an essential introduction to a new urban planning and design methodology called Data Augmented Design (DAD) ...
اقرأ المزيد
This volume provides a snapshot of the current state of the art in data mining, presenting it both in terms of technical ...
اقرأ المزيد
This book brings together a large number of analysis techniques that are suitable for IC fail data, but that are not available ...
اقرأ المزيد
8. 1. 1 Protein Subcellular Location The life sciences have entered the post-genome era where the focus of biological research ...
اقرأ المزيد
Batini and Scannapieco present a comprehensive and systematic introduction to the wide set of issues related to data quality. ...
اقرأ المزيد
This two-volume set (CCIS 1229 and CCIS 1230) constitutes the refereed proceedings of the 5th International Conference on ...
اقرأ المزيد
For 20 years, the IFIP WG 11. 3 Working Conference on Data and Appli- tions Security (DBSEC) has been a major forum for presenting ...
اقرأ المزيد
This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيد
This book presented secure query evaluation, location-based security/mobile security, distributed security issues, cryptographic-based ...
اقرأ المزيد