Electronic Books

Total Books: 821 - 840 /910
978-3-030-57582-3
The Illegal Trade of Medicines on Social Media

evaluates the impact of situational crime prevention measures implemented by social media platforms to identifying, blocking, ...

Continue reading
NoIMG
The Impact of Announcements on Stock Return at Damascus Securities Exchange: An Empirical Study جيسيكا الخوري ؛ مايا دخيل ؛ مايا حتاحت ؛ سلمى الكاتب ؛ إشراف د. سليمان موصللي

Announcements represent an important source of information to investors at stock exchanges and they are the center of the ...

Continue reading
NoIMG
The InfoSec Handbook : An Introduction to Information Security

The book offers a practical and simple view of the security practices while still offering somewhat technical and detailed ...

Continue reading
978-0-387-31168-5
The Information Society: Emerging Landscapes

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Continue reading
978-0-387-72381-5
The Information Society: Innovation, Legitimacy, Ethics and Democracy

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Continue reading
978-3-540-78731-0
The Internet of Things : First International Conference, IOT 2008, Zurich, Switzerland, March 26-28, 2008. Proceedings

This volume contains the proceeding softhe Internet of Things (IOT)Conference 2008, the ?rst international conference of ...

Continue reading
978-0-387-48907-0
The Morality of Business

That business is benevolent, positive, and honorable might seem a difficult argument given the hostility among intellectuals, ...

Continue reading
978-3-030-28683-5
The Potato Crop Its Agricultural, Nutritional and Social Contribution to Humankind

This book provides a fresh, updated and science-based perspective on the current status and prospects of the diverse array ...

Continue reading
978-3-540-27367-7
The Practical Real-Time Enterprise

A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...

Continue reading
NoIMG
The Privacy Engineer’s Manifesto : Getting from Policy to Code to QA to Value

The authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...

Continue reading
978-3-030-42148-9
The Role of Smallholder Farms in Food and Nutrition Security

This book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...

Continue reading
978-1-84628-806-7
The Safety of Systems

The papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...

Continue reading
978-0-387-48531-7
The Semantic Web : Real-World Applications from Industry

It offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...

Continue reading
978-3-540-31547-6
The Semantic Web: Research and Applications (vol. # 3532)

The vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...

Continue reading
978-1-4020-8544-4
The Socio-Economic Causes and Consequences of Desertification in Central Asia

This book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...

Continue reading
978-3-030-64375-1
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Continue reading
978-3-030-64378-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Continue reading
978-3-030-64381-2
Theory of Cryptography

This three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...

Continue reading
978-3-540-78524-8
Theory of Cryptography : Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008. Proceedings

The papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...

Continue reading
NoIMG
Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks / Chris Peiris, Binil Pillai, Abbas Kudrati

You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...

Continue reading
Total Books: 821 - 840 /910