Criminal Profiling: Principles and Practice provides a compendium of original scientific research on constructing a criminal ...
Weiterlesen
Provides an in-depth introduction to crisis management and leadership in SMEs, as well as methods, approaches and cases against ...
Weiterlesen
This book addresses all issues relevant to error prevention and safe practice in the acute and emergency health-care setting. ...
Weiterlesen
This practical and greatly expanded edition by media and public relations veteran Colin Doeg focuses on the communications ...
WeiterlesenThis book explores the impact of Covid-19 on universities, and how students, staff, faculty and academic leaders have adapted ...
Weiterlesen
we are concerned in this book with better understanding the reading and interpretation practices related to visual materials—here ...
Weiterlesen
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Weiterlesen
This volume is divided into three sections: the first one describes the nature of the component disciplines of STEM. The ...
WeiterlesenEmbraces the idea that in today's complex world, multiple, emerging perspectives are critical to the design fields, the ...
Weiterlesen
This work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
Weiterlesen
Border regions in Central Europe undergo tremendous changes due to the enlargement of the European Union and the related ...
WeiterlesenInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
Weiterlesen
The development of cryogenic devices for particle detection has reached a stage at which many interesting applications are ...
Weiterlesen
Unveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
Weiterlesen
Explores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
Weiterlesen
This book covers the study of computational methods, computer arithmetic algorithms, and design improvement techniques needed ...
Weiterlesen
Constitutes the refereed proceedings of the 7th International Workshop on Cryptographic Hardware and Embedded Systems, CHES ...
Weiterlesen
Includes challenging cryptographic solutions that are implemented in Java 17 and Jakarta EE 10. It provides a robust introduction ...
Weiterlesen
Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Weiterlesen
This book constitutes the refereed proceedings of the 19th International Conference on Cryptology and Network Security, CANS ...
Weiterlesen