This open access book examines the modern role of the European School system within the European Union, at a time when the ...
اقرأ المزيد
The development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
اقرأ المزيد
This groundbreaking, book analyses and compares data practices across several fields through the analysis of specific cases ...
اقرأ المزيد
This volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...
اقرأ المزيد
This open access book discusses how national citizenship is being transformed by economic, social and political change. It ...
اقرأ المزيد
This compact open access reference delves beyond popular concepts of educated consumers and an informed public by examining ...
اقرأ المزيد
This open access book offers an exploration of delusions--unusual beliefs that can significantly disrupt people's lives. ...
اقرأ المزيد
This book was stimulated by the third CWUAAT workshop, held in Cambridge, England in April 2006; the contributors representing ...
اقرأ المزيد
Designing Inclusive Futures reflects the need to explore, in a coherent way, the issues and practicalities that lie behind ...
اقرأ المزيد
This open access book addresses the issue of diffusing sustainable energy access in low- and middle-income contexts.The book ...
اقرأ المزيد
This open access book provides insight into the implementation of Life Cycle approaches along the entire business value chain, ...
اقرأ المزيد
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد
This book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
اقرأ المزيد
The book examines the methodological challenges in analyzing the effectiveness of development policies. It presents a selection ...
اقرأ المزيد
This volume presents key aspects in rapidly moving field in the areas of technology and information sciences - from international ...
اقرأ المزيد
This book constitutes the refereed proceedings of the 6th International Workshop, IWDW 2007, held in Guangzhou, China, in ...
اقرأ المزيد