In Risk Parity: How to Invest for All Market Environments, accomplished investment consultant Alex Shahidi delivers a powerful ...
Weiterlesen
This book is organized in topical sections on rule engineering, rule-based methodologies and applications in policies, electronic ...
Weiterlesen
The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Weiterlesen
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Weiterlesen
This book is segmented into four topical sections on foundations of computer science; computing by nature; networks, security, ...
Weiterlesen
This no-fluff desk reference offers direct access to the information you need to get the job done. It covers basic T-SQL ...
Weiterlesen
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language ...
Weiterlesen
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Weiterlesen
This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
Weiterlesen
This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...
Weiterlesen
In this volume the methodological aspects of the scenario logic and probabilistic (LP) non-success risk management are considered. ...
Weiterlesen
special emphasis was given to lessons for future thinking about the contribution of agriculture to: 1) poverty alleviation ...
Weiterlesen
This book covers comprehensive but fundamental principles and concepts of disaster and accident prevention and mitigation, ...
Weiterlesen
The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Weiterlesen
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Weiterlesen
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Weiterlesen
the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Weiterlesen
This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Weiterlesen
New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Weiterlesen
Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...
Weiterlesen