A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...
اقرأ المزيدThe authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...
اقرأ المزيد
This book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...
اقرأ المزيد
The papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...
اقرأ المزيد
It offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...
اقرأ المزيد
The vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...
اقرأ المزيد
This book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...
اقرأ المزيدThis study mainly deals with the impact of financial performance on the dividend distribution of the two Syrian telecom companies, ...
اقرأ المزيد
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
اقرأ المزيد
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
اقرأ المزيد
This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
اقرأ المزيد
This book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
اقرأ المزيد
The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
اقرأ المزيدYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
اقرأ المزيد
The LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيدThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
اقرأ المزيد
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
اقرأ المزيد