The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Continue readingThis book presents new approaches for researching values as they are performed or materialized. Values have been an important ...
Continue reading
It provides the tools for effective human resource management, summarized in the following seven success factors: demographic-oriented ...
Continue reading
People use software and other technical systems in many ways, and a considerable amount of time and energy may be spent integrating ...
Continue reading
Responsibility and Dependable Systems is the first book to examine the relationship between responsibility and system dependability. ...
Continue reading
Sustainability and procurement Sustainable sourcing Responsible sourcing Purchasing Category management Operating models ...
Continue reading
In Retargetable Processor System Integration into Multi-Processor System-on-Chip Platforms, such originally independent approaches ...
Continue reading
The goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Continue reading
McInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Continue reading
Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
Continue reading
At a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers ...
Continue reading
The main goal of this book is to make the reader familiar with the complexity and multi-dimensionality of the subject RISK, ...
Continue reading
Economic growth and globalisation create traffic growth, leading to congestion, which again increases travel times and costs. ...
Continue reading
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Continue reading
For operators of nuclear research facilities, it is of particular importance to investigate minor incidents. The nuclear ...
Continue readingSafety is one of the most important issues today. Recent international standards such as ISO and IEC have consistently advocated ...
Continue reading
This is a pioneering work. Recent disasters such as the tsunami disaster continue to demonstrate Professor Allinson’s thesis ...
Continue reading
This book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Continue reading
The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Continue reading
New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Continue reading