 
                Contractual Management offers a holistic approach to managerial decision-making based on contracts or business processes ...
WeiterlesenThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...
Weiterlesen 
                This volume provides a critical overview of the nature of nanotechnology (and its applications in the biomedical sciences, ...
Weiterlesen 
                This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Weiterlesen 
                This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
Weiterlesen 
                This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, ...
WeiterlesenCovers a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, ...
WeiterlesenThis book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...
Weiterlesen 
                Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Weiterlesen 
                Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Weiterlesen 
                The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Weiterlesen 
                It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Weiterlesen 
                The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Weiterlesen 
                Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Weiterlesen