This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Lee masStudies the contribution of joint venture (JV) use as means of financing flexibility against the background of diverse financial ...
Lee masThis book is not to be viewed as a scientific study; the aim of the authors and publishers is to familiarise foreign investors ...
Lee masDistributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed ...
Lee masOffers a trusted, completely updated source of information for education, training, and development of pharmacists. Published ...
Lee masThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Lee masThis book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
Lee masThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Lee masMcInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Lee masBrings together some of the best writing by leading authorities on many key topics, including benchmarking, lean quality, ...
Lee masRule Breaker is a manifesto for a new wave of leadership. One that operates in flatter workplaces where command and control ...
Lee masIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Lee masThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lee masThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lee masExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lee masThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Lee masYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Lee masThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
Lee masThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lee masThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Lee mas