The book explains the security architecture model and the practice of building data sharing from the blockchain infrastructure, ...
Continue readingBlockchain technology is a powerful, cost-effective method for network security. Essentially, it is a decentralized ledger ...
Continue readingWhile the problems of long-term stability and biocompatibility are being addressed, several promising prototypes are starting ...
Continue readingThis book argues that this standard image of the great German philosopher is radically wrong. Not only does Kant reflect ...
Continue readingThe ability of stem cells to acquire different desired phenotypes has opened the door for a new discipline: regenerative ...
Continue readingTissue engineering is gaining interest as it is applied for regeneration of organs to attain their lost function. Although ...
Continue readingThis book constitutes the refereed proceedings of the 21st IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE ...
Continue readingthis book analyses patterns of internationalisation comprising the national and supranational level, the level of higher ...
Continue readingBorders, Mobility and Technologies of Control provides a model of criminological inquiry that is global in scope, constructionist ...
Continue readingThis book uses Pierre Bourdieu’s field theory as a lens through which to examine military operations. Novel in its approach, ...
Continue readingThere are several crucial feedbacks from forests to the climate system. The mechanisms for those feedbacks are elaborated ...
Continue readingThis volume adopts an ecosystems approach to understanding the world's boreal peatlands. It focuses on biogeochemical patterns ...
Continue readingThe book considers the diverse experiences of urban and rural families before the war and the effects of the timing of their ...
Continue readingBotanicals, which have been part of human food and medicine for thousands of years, are perceived as being safer than synthetic ...
Continue readingThis easy-to-use book helps you acquire a wealth of fascinating information about plants. There are 130 pages with text, ...
Continue readingBotnet Detection: Countering the Largest Security Threat, a contributed volume by world-class leaders in this field, is based ...
Continue readingThe book is the result of intensive work of 43 authors, all of them leading scientists in the Botrytis sciences. New technologies ...
Continue readingBoundary representation is the principle solid modelling method used in modern CAD/CAM systems. There have been a long series ...
Continue readingThe book is rich in references and leaves no aspect of the problem untouched. The morphological, pharmacological, physiological ...
Continue readingThis text is intended to provide an overview of brain death. The topics explored in this book are the concept and historical ...
Continue reading