This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
اقرأ المزيدStudies the contribution of joint venture (JV) use as means of financing flexibility against the background of diverse financial ...
اقرأ المزيدThis book is not to be viewed as a scientific study; the aim of the authors and publishers is to familiarise foreign investors ...
اقرأ المزيدDistributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed ...
اقرأ المزيدOffers a trusted, completely updated source of information for education, training, and development of pharmacists. Published ...
اقرأ المزيدThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
اقرأ المزيدThis book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
اقرأ المزيدThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
اقرأ المزيدMcInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
اقرأ المزيدBrings together some of the best writing by leading authorities on many key topics, including benchmarking, lean quality, ...
اقرأ المزيدRule Breaker is a manifesto for a new wave of leadership. One that operates in flatter workplaces where command and control ...
اقرأ المزيدIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
اقرأ المزيدThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
اقرأ المزيدThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
اقرأ المزيدExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
اقرأ المزيدThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
اقرأ المزيدYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
اقرأ المزيدThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
اقرأ المزيدThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
اقرأ المزيدThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
اقرأ المزيد