Provides the practitioner with a framework for establishing a diagnosis and developing a suitable treatment plan in patients ...
Continue reading
Creating Client Extranets with SharePoint 2003 is a guide for creating client-facing extranets using SharePoint 2003. This ...
Continue reading
Creating Flash Widgets with Flash CS4 and ActionScript 3.0 is an introduction to developing widgets for the Internet using ...
Continue readingThis excellent text recognises that efforts towards improving development outcomes must work in concert with strategies which ...
Continue reading
Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is ...
Continue readingDigital imaging is now available to all amateur astronomers at a reasonable price. The advent of CCDs, DSLRs and – perhaps ...
Continue reading
The book provides an explanation for the emergence of innovation and creativity in the music industry by retelling and interpreting ...
Continue reading
Crimean-Congo hemorrhagic fever (CCHF) is a tick-borne disease associated with severe hemorrhagic manifestations. CCHF has ...
Continue reading
This volume contains the proceedings of the 1st International Workshop on Critical Information Infrastructure Security (CRITIS ...
Continue reading
This text brings together differing geographic perspectives in modelling and analysis in order to highlight infrastructure ...
Continue reading
This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue reading
This book is dedicated to advancing research, development and implementation efforts focused on infrastructure protection.
Continue reading
Prevention and preparedness are the two basic approaches to maximize food security against any sort of tampering, whether ...
Continue reading
This compilation presents minireviews derived from work presented at the Aegean Conference, which occurred October 9-14, ...
Continue reading
The last two years have witnessed a continuation in the breakthrough shift toward pulse tube cryocoolers for long-life, high-reliability ...
Continue reading
CryptoGraphics: Exploiting Graphics Cards for Security explores the potential for implementing ciphers within graphics processing ...
Continue reading
These are the proceedings of the Eighth Workshop on Cryptographic Hardware and Embedded Systems (CHES 2006) held in Yokohama, ...
Continue reading
The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue reading
The papers collected in this volume represent cutting-edge world wide research in the rapidly evolving fields of crypto-hardware, ...
Continue reading
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Continue reading