This book presents contemporary perspectives on the role of a learning society from the lens of leading practitioners, experts ...
Continue readingThe ideas and imagery about the future that characterize nanotechnology today are shaped by multiple values and agendas which ...
Continue readingConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Continue readingThe aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
Continue readingVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Continue readingThe papers address different development modes, roles in the value chain, stakeholders’ viewpoints, collaborative development, ...
Continue readingIn the eyes of many, one of the most challenging problems of the information society is that we are faced with an ever expanding ...
Continue readingThe chapters address whether we have entered a "new normal" of low growth, negative real rates, and deflationary pressures, ...
Continue readingThis book is organized in topical sections on provenance: models and querying; provenance: visualization, failures, identity; ...
Continue readingThis book is organized in topical sections on algebraic and number theoretical cryptoanalysis, theory of public key encryption, ...
Continue readingThis book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Continue readingThis book analyses the different types of post-execution punishments and other aggravated execution practices, the reasons ...
Continue readingPynchon and Philosophy radically reworks our readings of Thomas Pynchon alongside the theoretical perspectives of Wittgenstein, ...
Continue readingThe book analyses in detail the problems currently being faced by researchers working in the field of RFID technology and ...
Continue readingThis book is organized in topical sections on rootkit prevention, malware detection and prevention, high performance intrusion ...
Continue readingThe book addressed span a wide range of problems and solutions associated with the teaching of programming such as introductory ...
Continue readingThis book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and ...
Continue readingIt is widely assumed that our consumer society can move from using fossil fuels to using renewable energy sources while maintaining ...
Continue readingIn this book, Christopher Henke and Benjamin Sims explore the causes and consequences of the strange, ambivalent, and increasingly ...
Continue readingThis book constitutes the refereed proceedings of the 9th European Conference on Research and Advanced Technology for Digital ...
Continue reading