A guide for designing, constructing and maintaining reinforced concrete structures, such as buildings and bridges which are ...
Lee mas
Intended for students at the L and M levels of the university as well as for engineers wishing to study certain subjects ...
Lee masThis excellent text recognises that efforts towards improving development outcomes must work in concert with strategies which ...
Lee mas
How do scientists use analogies and other processes to break away from old theories and generate new ones? This book documents ...
Lee mas
Fighting crime breeds emotional responses which often lead to counter-productive government policy. To allow a rational analysis ...
Lee mas
This book explores the issue of legitimate criminalization in a modern, liberal society. Coverage provides a comparative ...
Lee mas
The book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
Lee mas
The book include extrema, even valued functionals, weak and double linking, sign changing solutions, Morse inequalities, ...
Lee mas
This work takes stock of the different conceptions of fundamental value in finance, the methods of its calculation and the ...
Lee mas
Sebastian Knoll investigates what cross-business synergies actually are and how they are realized successfully. In a first ...
Lee mas
RSA is a public-key cryptographic system, and is the most famous and widely-used cryptographic system in today's digital ...
Lee mas
This book constitutes the refereed proceedings of the 10th Interntaional Workshop on Cryptographic Hardware and Embedded ...
Lee mas
Constitutes the refereed proceedings of the 10th IMA International Conference on Cryptography and Coding, held in Cirencester, ...
Lee mas
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Lee mas
This book presented signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key ...
Lee mas
Introduces students to the compelling and evolving field of cryptography and network security. In an age of viruses and hackers, ...
Lee mas
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field Is ...
Lee mas
This book investigates the study of World Englishes from the perspective of Cultural Linguistics, a theoretical and analytical ...
Lee mas
This volume is covering many topics in control theory and several different applications. The variety of their research is ...
Lee mas
This volume is covering many topics in control theory and several different applications. The variety of their research is ...
Lee mas