This book brings together perspectives from multiple disciplines including psychology, law, IS, and computer science on ...
WeiterlesenBatini and Scannapieco present a comprehensive and systematic introduction to the wide set of issues related to data quality. ...
WeiterlesenThis volume contains the papers presented at the 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security ...
WeiterlesenThis book constitutes the refereed proceedings of the 34th Annual IFIP WG 11.3 Conference on Data and Applications Security ...
WeiterlesenThis book constitutes the refereed proceedings of the 13th International Conference on Database Systems for Advanced Applications, ...
WeiterlesenThis open access book discusses how national citizenship is being transformed by economic, social and political change. It ...
WeiterlesenThis compact open access reference delves beyond popular concepts of educated consumers and an informed public by examining ...
WeiterlesenThis open access book offers an exploration of delusions--unusual beliefs that can significantly disrupt people's lives. ...
WeiterlesenThe European Workshop on Astronomical Molecules was held at ‘The Conference Building’ in Zwolle, the Netherlands, on ...
WeiterlesenThis book was stimulated by the third CWUAAT workshop, held in Cambridge, England in April 2006; the contributors representing ...
WeiterlesenDesigning Inclusive Futures reflects the need to explore, in a coherent way, the issues and practicalities that lie behind ...
WeiterlesenThis open access book addresses the issue of diffusing sustainable energy access in low- and middle-income contexts.The book ...
WeiterlesenThis open access book provides insight into the implementation of Life Cycle approaches along the entire business value chain, ...
WeiterlesenThe first half of the book takes a broader look at corporate innovation as a whole and how accelerators fit in, then the ...
WeiterlesenThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book presented malware; network security, Web security; attacks; Security-Intrusion; Detection and Response
WeiterlesenThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThis book constitutes the refereed proceedings of the 5th International Conference on Detection of Intrusions and Malware, ...
WeiterlesenThe book examines the methodological challenges in analyzing the effectiveness of development policies. It presents a selection ...
WeiterlesenThis book constitutes the refereed proceedings of the 12th International Conference on Developments in Language Theory, DLT ...
Weiterlesen