Electronic Books

Total Books: 821 - 840 /910
The Illegal Trade of Medicines on Social Media

evaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, ...

Weiterlesen
NoIMG
The Impact of Announcements on Stock Return at Damascus Securities Exchange: An Empirical Study جيسيكا الخوري ؛ مايا دخيل ؛ مايا حتاحت ؛ سلمى الكاتب ؛ إشراف د. سليمان موصللي

Announcements represent an important source of information to investors at stock exchanges and they are the center of the ...

Weiterlesen
NoIMG
The InfoSec Handbook : An Introduction to Information Security

The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed ...

Weiterlesen
The Information Society: Emerging Landscapes

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Weiterlesen
The Information Society: Innovation, Legitimacy, Ethics and Democracy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Weiterlesen
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

Weiterlesen
The Morality of Business

That business is benevolent, positive, and honorable might seem a difficult argument given the hostility among intellectuals, ...

Weiterlesen
The Potato Crop Its Agricultural, Nutritional and Social Contribution to Humankind

This book provides a fresh, updated and science-based perspective on the current status and prospects of the diverse array ...

Weiterlesen
The Practical Real-Time Enterprise

A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...

Weiterlesen
NoIMG
The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value

The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...

Weiterlesen
The Role of Smallholder Farms in Food and Nutrition Security

This book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...

Weiterlesen
The Safety of Systems

The papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...

Weiterlesen
The Semantic Web : Real-World Applications from Industry

It offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...

Weiterlesen
The Semantic Web: Research and Applications (vol. # 3532)

The vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...

Weiterlesen
The Socio-Economic Causes and Consequences of Desertification in Central Asia

This book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...

Weiterlesen
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Weiterlesen
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Weiterlesen
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Weiterlesen
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Weiterlesen
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

Weiterlesen
Total Books: 821 - 840 /910