Covering a range of key topics, this up-to-date volume discusses current research in areas such as microbiome-based therapeutics ...
Lee masPrinciples of Bacterial Detection: Biosensors, Recognition Receptors and Microsystems will cover the up-to-date biosensor ...
Lee masAdvances over the past decades in space flight technology have allowed U.S., Russian, and other space programs to not only ...
Lee masThis book gives an overview of the principles and applications of fluorescence. It is well structured, starting with basic ...
Lee masEmphasizes all aspects of information security, rather than just a technical control perspective. You receive a broad overview ...
Lee masFeatures new content on 4G cellular systems, 5G cellular outlook, bandpass signals and systems, and polarization, among many ...
Lee masIntroduces the fundamentals and process of applied engineering design, including the necessary field investigations to characterize ...
Lee masThis book constitutes the thoroughly refereed post-proceedings of the 7th International Symposium on Privacy Enhancing Technologies, ...
Lee masTraditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either ...
Lee masThe papers in this volume represent the proceedings of the 5th International Workshop, PET 2005, Cavtat, Croatia, May 30-June ...
Lee masThe papers in this volume represent the proceedings of The 6th Workshop on Privacy Enhancing Technologies, PET 2006, was ...
Lee masConstitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, ...
Lee masData mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns ...
Lee masThe aim of the book is to create a bridge between two ‘lands’ that are usually kept separate: technical tools and legal ...
Lee masPrivacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological ...
Lee masVast amounts of data are collected by service providers and system administ- tors, and are available in public information ...
Lee masWith our society's growing dependency on information technology systems (IT), IT security is crucial. To properly respond ...
Lee masWhile other extreme programming (XP) books are usually theoretical in approach, this book steers you through the practical ...
Lee masXML is the de facto language for communication within and between distributed applications, whether they're on the Internet ...
Lee masPro ASP.NET 2.0 Website Programming shows you how to harness the ASP.NET technology to build websites that tackle real business ...
Lee mas