A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...
اقرأ المزيدThe authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...
اقرأ المزيدThis book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...
اقرأ المزيدThe papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...
اقرأ المزيدIt offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...
اقرأ المزيدThe vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...
اقرأ المزيدThis book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...
اقرأ المزيدThis study mainly deals with the impact of financial performance on the dividend distribution of the two Syrian telecom companies, ...
اقرأ المزيدThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
اقرأ المزيدThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
اقرأ المزيدThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
اقرأ المزيدThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
اقرأ المزيدThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
اقرأ المزيدYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيدThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
اقرأ المزيدThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
اقرأ المزيد