The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue readingThis book presents new approaches for researching values as they are performed or materialized. Values have been an important ...
Continue readingIt provides the tools for effective human resource management, summarized in the following seven success factors: demographic-oriented ...
Continue readingPeople use software and other technical systems in many ways, and a considerable amount of time and energy may be spent integrating ...
Continue readingResponsibility and Dependable Systems is the first book to examine the relationship between responsibility and system dependability. ...
Continue readingSustainability and procurement Sustainable sourcing Responsible sourcing Purchasing Category management Operating models ...
Continue readingIn Retargetable Processor System Integration into Multi-Processor System-on-Chip Platforms, such originally independent approaches ...
Continue readingThe goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Continue readingMcInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Continue readingSoftware reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
Continue readingAt a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers ...
Continue readingThe main goal of this book is to make the reader familiar with the complexity and multi-dimensionality of the subject RISK, ...
Continue readingEconomic growth and globalisation create traffic growth, leading to congestion, which again increases travel times and costs. ...
Continue readingThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Continue readingFor operators of nuclear research facilities, it is of particular importance to investigate minor incidents. The nuclear ...
Continue readingSafety is one of the most important issues today. Recent international standards such as ISO and IEC have consistently advocated ...
Continue readingThis is a pioneering work. Recent disasters such as the tsunami disaster continue to demonstrate Professor Allinson’s thesis ...
Continue readingThis book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Continue readingThe scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Continue readingNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Continue reading