Contractual Management offers a holistic approach to managerial decision-making based on contracts or business processes ...
Continue readingThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Continue reading
This book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...
Continue reading
This volume provides a critical overview of the nature of nanotechnology (and its applications in the biomedical sciences, ...
Continue reading
This book constitutes the refereed proceedings of the First European Conference on Intelligence and Security Informatics, ...
Continue reading
This book assesses this research frontier from a computer science perspective, investigating the various scientific and technological ...
Continue reading
This book constitutes the refereed proceedings of the 13th IFIP WG 2.13 International Conference on Open Source Systems, ...
Continue readingCovers a wide range of topics related to free, libre, and open source software (FLOSS), including: licensing, strategies, ...
Continue readingThis book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by ...
Continue reading
Constitutes the refereed proceedings of the International Conference on Privacy in Statistical Databases, PSD 2008, held ...
Continue reading
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Continue reading
The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Continue reading
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Continue reading
The scope of the book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
Networked computers are ubiquitous, and are subject to attack, misuse, and abuse. One method to counteracting this cyber ...
Continue reading