This book constitutes the refereed proceedings of the5th IFIP Conference e-Commerce, e-Business, and e-Government (I3E’2005), ...
WeiterlesenThis book documents myriads of ways community-based climate change adaptation and resilience programs are being implemented ...
WeiterlesenOffers critical insights into the thriving international field of community indicators, incorporating the experiences of ...
WeiterlesenOver the past decade, community schools similar to those supported by Save the Children have been established in many developing ...
WeiterlesenThis book provides new thinking on scientific identity formation. It thoroughly interrogates the concepts of community and ...
WeiterlesenThe book explores five major topics: state-society relations; environmental non-governmental organizations (ENGOs); Green ...
WeiterlesenIn the twenty-first century, applications in medicine and engineering must acquire greater safety and flexibility if they ...
WeiterlesenThe global economic infrastructure is becoming increasingly dependent upon information technology, with computer and communication ...
WeiterlesenThe Indian Conference on Computer Vision, Graphics and Image Processing (ICVGIP) is a forum bringing together researchers ...
WeiterlesenContaminated Soils Volume 9 contains 38 technical papers, covering a wide range of environmental issues. Volume discussion ...
WeiterlesenThe search for the best possible performance is inherent in human nature. Individuals, enterprises and governments all seek ...
WeiterlesenHigher education finances lie at the crossroads in many Western countries. On the one hand, the surging demand of the past ...
WeiterlesenOne key outcome of this book is a better understanding of the independent contributions from across the international community ...
WeiterlesenFighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
WeiterlesenAn unacknowledged key feature of East Asian FTA diplomacy is the region's active cross-regional preferential trading relations. ...
WeiterlesenModern cryptosystems, used in numerous applications that require secrecy or privacy - electronic mail, financial transactions, ...
WeiterlesenCyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
WeiterlesenImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
WeiterlesenThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
WeiterlesenThis book provides statistical tools for evaluating the effects of public policies advocated by governments and public institutions. ...
Weiterlesen