This quick-reference handbook offers a concise and practical review of key aspects of the treatment of ST-segment elevation ...
Continue reading
This volume describes and explains the educational method of Case-Based Clinical Reasoning (CBCR) used successfully in medical ...
Continue reading
This textbook takes the reader step-by-step through the concepts of mechanics in a clear and detailed manner. Mechanics is ...
Continue reading
This book presented in this volume were carefully reviewed and selected from 27 submissions. They deal with theoretical and ...
Continue reading
This volume contains the papers presented at POST 2018, the 7th Conference on Principles of Security and Trust, held April ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Continue reading
The papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Continue reading
Constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue reading
Vast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Continue reading
This book provides good, short, solid information with as little waffle as possible. And the book includes solid examples ...
Continue reading
Pro CSS and HTML Design Patterns is a reference book and a cookbook on how to style web pages using CSS and XHTML. It contains ...
Continue reading
Pro Service-Oriented Smart Clients with .NET 2.0 demonstrates how Smart Clients satisfy multiple purposes. First, you deploy ...
Continue reading
This book is open access under a CC BY 4.0 license. It relates to the III Annual Conference hosted by the Russian Federal ...
Continue reading
This volume contains the papers presented at the 27th European Symposium on Pro-gramming (ESOP 2018) held 2018, in Thessaloniki, ...
Continue reading
Beginning and experienced programmers will use this comprehensive guide to persistent memory programming. You will understand ...
Continue reading
This book is organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security ...
Continue reading
It covers aspects of unsupervised machine learning used for knowledge discovery in data science and introduces a data-driven ...
Continue reading
This book is open access under a CC BY 4.0 license.This book analyses the considerable variation in the shares of private ...
Continue reading
"This open access book deals with contestations “from below” of legal policies and implementation practices in asylum ...
Continue reading
This book constitutes the refereed proceedings of the 14th International Conference on Provable Security, ProvSec 2020, held ...
Continue reading