Covers important concepts in service design and delivery including customer experiences, peer-to-peer services, the organization’s ...
WeiterlesenThe third in the series on Stakeholder Management, this volume presents a wide array of case studies to demonstrate how Stakeholder ...
WeiterlesenLupus erythematosus is a chronic inflammatory autoimmune disease characterized by a wide spectrum of manifestations with ...
WeiterlesenThis book describes unusual cases of cutaneous lymphomas and is of special interest for clinicians and pathologists dealing ...
WeiterlesenCutting Tool Technology provides a comprehensive guide to the latest developments in the use of cutting tool technology. ...
WeiterlesenThis volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
WeiterlesenHumans can be exposed to cyanobacterial toxins by drinking water that contains the toxins, swimming in water that contains ...
WeiterlesenThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
WeiterlesenThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
WeiterlesenPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
WeiterlesenFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
WeiterlesenThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
WeiterlesenThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
WeiterlesenTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
WeiterlesenIn this concise yet comprehensive textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems ...
WeiterlesenCovers the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement ...
WeiterlesenThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
WeiterlesenCyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
WeiterlesenThis book is, perhaps, the first attempt to present a unified exposition of the subject and methodology of cybernetical physics ...
WeiterlesenWritten by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information ...
Weiterlesen