This book discusses privacy as multi-dimensional, and then pulls forward the economics of privacy in the first few chapters. ...
Continue readingThis book addresses how to help students find purpose in a rapidly changing world. In a probing and visionary analysis of ...
Continue readingEngineering the Knowledge Society (EKS) - Event of the World Summit on the Information Society (WSIS) This book is the result ...
Continue readingEducational Algebra: A Theoretical and Empirical Approach adds to previous developments with priority given to a pragmatic ...
Continue readingIT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...
Continue readingIT service management (ITSM) is the group of processes and functions that oil the wheels of the IT machine. Without ITSM, ...
Continue readingThe book gives a brief overview of various information-processing techniques and demonstrates the interactions of the numerical ...
Continue readingThis unique book presents a mathematical as well as a non-mathematical route through the theories, controversies, and investigations, ...
Continue readingThe book offers a careful introduction to modern non-linear mechanics. The used mathematical tools, such as tensor algebra ...
Continue readingThe book presents in detail the used mathematical tools, such as tensor algebra and analysis. The general theory of mechanical ...
Continue readingThis book aims to provide a comprehensive introduction to the theory and applications of the mechanics of transversely isotropic ...
Continue readingThis book constitutes the refereed proceedings of the 6th Conference on Electronic Governance and Open Society: Challenges ...
Continue readingIn defining the state of the art of E-Government, EGOV 2002 was aimed at breaking new ground in the development of innovative ...
Continue readingThis book constitutes the refereed proceedings of the 7th International Conference on Electronic Government, EGOV 2008, held ...
Continue readingThis book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...
Continue readingThis book introduces a taxonomy of electronic postage systems and explains their security risks and countermeasures. The ...
Continue readingAll the essential topics in information theory are covered in detail, including entropy, data compression, channel capacity, ...
Continue readingThe authors present new results on issues involving wireless LANs and ad hoc networks; mobile wireless internet and satellite ...
Continue readingThis book includes the papers selected for the BASYS’04 conference, which was held in Vienna, Austria in September 2004 ...
Continue readingThis book, in conjunction with the volume CCIS 19, constitutes the refereed proceedings of theFirst World Summit, WSKS 2008, ...
Continue reading