This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
اقرأ المزيد
The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
اقرأ المزيد
This volume is the Italian version of the original Principles of Food Sanitation, now in its fifth edition, whose validity ...
اقرأ المزيد
This book constitutes the refereed proceedings of the First International Conference on Scalable Uncertainty Management, ...
اقرأ المزيد
Welcome to the proceedings of the 5th International Conference on Scale-Space and PDE Methods in Computer Vision. The scale-space ...
اقرأ المزيد
This book constitutes the refereed proceedings of the Third International Conference on Scale-Space and Morphology in Computer ...
اقرأ المزيد
This collection continues along a rich, fruitful path opened by Richard H. Popkin and pursued by many important scholars, ...
اقرأ المزيد
This volume will be of interest and importance to researchers, agency personnel, and natural resource managers who are contemplating ...
اقرأ المزيد
New forms of imaging in science have nearly always led to major advances, especially at the nanoscale, and the pace of these ...
اقرأ المزيد
This book covers comprehensive but fundamental principles and concepts of disaster and accident prevention and mitigation, ...
اقرأ المزيد
This book reveals the hidden power of the script we read in and how it shapes and drives our minds, ways of thinking, and ...
اقرأ المزيد
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
اقرأ المزيد
the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
اقرأ المزيد
This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
اقرأ المزيد
New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
اقرأ المزيد
This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...
اقرأ المزيد
Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
اقرأ المزيد
Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...
اقرأ المزيد
" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
اقرأ المزيد
This book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
اقرأ المزيد