One key outcome of this book is a better understanding of the independent contributions from across the international community ...
Continue readingThe era of mobile technology opens the windows to the mobile apps. The websites are vanishing and the mobile phones are emerging. ...
Continue readingCreating Client Extranets with SharePoint 2003 is a guide for creating client-facing extranets using SharePoint 2003. This ...
Continue readingIt is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...
Continue readingIt is holding more than 500 pages of combined wisdom on Technology Enhanced Learning (TEL) in your hands! With the advance ...
Continue readingRemote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is ...
Continue readingMany new micro-theories of knowledge and technology creation have emerged in the last decade of the 20th Century and in the ...
Continue readingThis book explores the emotional labour of crisis reporters in an original style that combines fictional and factual narrative. ...
Continue readingStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
Continue readingStarting with some basic definitions and assumptions on the topic, this book explores various aspects of Critical Infrastructures ...
Continue readingThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue readingThis book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue readingThis volume is divided into three sections: the first one describes the nature of the component disciplines of STEM. The ...
Continue readingInvestment platforms are challenging the grip of massive business on the venture sector and are providing new means of power ...
Continue readingThe last two years have witnessed a continuation in the breakthrough shift toward pulse tube cryocoolers for long-life, high-reliability ...
Continue readingUnveils the biggest scams and frauds that have shocked the world of cryptocurrency, from the disappearing Crypto Queen with ...
Continue readingExplores the emergence of a decentralised and disintermediated crypto-market and investigates the way in which it can transform ...
Continue readingIntroduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Continue readingA rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Continue readingThe central purpose of this collection of essays is to make a creative addition to the debates surrounding the cultural heritage ...
Continue reading