The third in the series on Stakeholder Management, this volume presents a wide array of case studies to demonstrate how Stakeholder ...
Continue readingLupus erythematosus is a chronic inflammatory autoimmune disease characterized by a wide spectrum of manifestations with ...
Continue readingCutting Tool Technology provides a comprehensive guide to the latest developments in the use of cutting tool technology. ...
Continue readingThis volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
Continue readingThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Continue readingThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Continue readingPart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
Continue readingFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
Continue readingThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
Continue readingTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Continue readingIn this concise yet comprehensive textbook, future inventors are introduced to the key concepts of Cyber-Physical Systems ...
Continue readingCovers the various aspects associated with Cyber-Physical Systems (CPS) such as algorithms, application areas, and the improvement ...
Continue readingThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Continue readingCyber attacks perpetrated against businesses, governments, organizations, and individuals have been occurring for decades. ...
Continue readingThis book is, perhaps, the first attempt to present a unified exposition of the subject and methodology of cybernetical physics ...
Continue readingWritten by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information ...
Continue readingThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
Continue readingThis book presents the main scientific results from the H2020 GUARD project. The GUARD project aims at filling the current ...
Continue readingThe development of Internet, mobile communications, distributed computing, computer software and databases storing essential ...
Continue readingThis monograph, divided into four parts, presents a comprehensive treatment and systematic examination of cycle spaces of ...
Continue reading