This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
Continue readingThe use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe ...
Continue readingThis volume is the Italian version of the original Principles of Food Sanitation, now in its fifth edition, whose validity ...
Continue readingThis book constitutes the refereed proceedings of the First International Conference on Scalable Uncertainty Management, ...
Continue readingWelcome to the proceedings of the 5th International Conference on Scale-Space and PDE Methods in Computer Vision. The scale-space ...
Continue readingThis book constitutes the refereed proceedings of the Third International Conference on Scale-Space and Morphology in Computer ...
Continue readingThis collection continues along a rich, fruitful path opened by Richard H. Popkin and pursued by many important scholars, ...
Continue readingThis volume will be of interest and importance to researchers, agency personnel, and natural resource managers who are contemplating ...
Continue readingNew forms of imaging in science have nearly always led to major advances, especially at the nanoscale, and the pace of these ...
Continue readingThis book covers comprehensive but fundamental principles and concepts of disaster and accident prevention and mitigation, ...
Continue readingThis book reveals the hidden power of the script we read in and how it shapes and drives our minds, ways of thinking, and ...
Continue readingAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Continue readingthe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Continue readingThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Continue readingNew data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Continue readingThis book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...
Continue readingWelcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was ...
Continue readingTheme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...
Continue reading" This volume contains the papers presented at the12th International Workshop, Cambridge, UK, April 26-28, 2004. Our theme ...
Continue readingThis book constitutes the proceedings of the 12th International Conference on Security and Cryptography for Networks, SCN ...
Continue reading