This open access book investigates the inter-relationship between the mind and a potential opportunity to explore the psychology ...
WeiterlesenExtends recent work on entrepreneurship in response to adverse events to explore entrepreneurial responses by people who ...
WeiterlesenThe book begins with introductory chapters on the etiology of intersex conditions, conceptual clarification, legal issues, ...
WeiterlesenWhether they involve excess, a decrease, or complete absence, problems of sexual desire drive women to consult sex therapists, ...
WeiterlesenFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
WeiterlesenThis book is a documentation wide range of disciplines and experience, looking of an inspiring evening of design and discussion.
WeiterlesenThis book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...
WeiterlesenThe theory of functional identities (FIs) is a relatively new one - the first results were published at the beginning of ...
WeiterlesenThis book a classic on the foundations of quantum theory. This view, which is essentially geometric and relies on the concept ...
WeiterlesenPositioning analysis penetrates beneath surface issues to their underlying psychological causes and social effects, with ...
WeiterlesenThis book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
WeiterlesenSince the debut of the original edition, the Handbook of Psychodiagnostic Testing has been an invaluable aid to students ...
WeiterlesenThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
WeiterlesenThis book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
WeiterlesenThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
WeiterlesenIndiscrete Thoughts gives a glimpse into a world that has seldom been described, that of science and technology as seen through ...
WeiterlesenThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Weiterlesenhis volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...
WeiterlesenThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
WeiterlesenThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
Weiterlesen