This book provides an ample coverage of theoretical and experimental state-of-the-art work as well as new trends and directions ...
Continue reading
This book describes the interdisciplinary work of USAID’s Famine Early Warning System Network (FEWS NET) and its in uence ...
Continue reading
Fast Software Encryption (FSE) 2006 is the 13th in a series of workshops on symmetric cryptography. It has been sponsored ...
Continue reading
The sophistication of the underlying cryptographic algorithms, the high complexity of the implementations, and the easy access ...
Continue readingThe aim of this book is to take stock of, critically engage, and celebrate feminist IR scholarship produced in Europe. Organized ...
Continue reading
The Field Manual of Techniques in Invertebrate Pathology is designed to provide background and instruction on a broad spectrum ...
Continue reading
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
The scope of This book includes: foundations of computer science; software theory and practice; education; computer applications ...
Continue reading
This book presents the position that the online environment is a significant and relevant theater of activity in the fight ...
Continue reading
This book summarizes in detail the contemporary knowledge of filoviruses and diseases they cause. Almost the entirety of ...
Continue reading
Constitutes the post-proceedings of the 5th International Conference on Financial Cryptography held in the British West Indies ...
Continue reading
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue reading
This book cover all aspects of securing transactions and systems, which this year included a range of technical areas such ...
Continue reading
The 9th International Conference on Financial Cryptography and Data Security (FC 2005) was held in the Commonwealth of Dominica ...
Continue reading
This book constitutes the thoroughly refereed post-proceedings of the 10th International Conference on Financial Cryptography ...
Continue reading
This book constitutes the thoroughly refereed post-conference proceedings of the 12th International Conference on Financial ...
Continue reading
This book constitutes the refereed proceedings of two workshops held at the 24th International Conference on Financial Cryptography ...
Continue reading
Philipp Jostarndt analyzes the anatomy of financial distress for a large sample of German corporations. He studies distress-induced ...
Continue readingCovers financial data and univariate models; asset returns; interest rates, yields and spreads; volatility and correlation; ...
Continue reading
Combines theoretical and commercial perspectives informed by the author's professional experience and academic research Thoroughly ...
Continue reading