This book contains variety of subjects in modern high performance computing and its applications, such as numerical and ...
Lire la suiteThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
Lire la suiteThis volume is covering many topics in control theory and several different applications. The variety of their research is ...
Lire la suiteThis open access book examines the modern role of the European School system within the European Union, at a time when the ...
Lire la suiteComputer graphics is important in many areas including engineering design, architecture, education, and computer art and ...
Lire la suiteThe third in the series on Stakeholder Management, this volume presents a wide array of case studies to demonstrate how Stakeholder ...
Lire la suiteCutting Tool Technology provides a comprehensive guide to the latest developments in the use of cutting tool technology. ...
Lire la suiteThis volume is one of the very few publications dedicated to the challenges that Continental philosophy poses to the field ...
Lire la suiteThis book constitutes the refereed proceedings of the 16th International Annual Conference on Cyber Security, CNCERT 2020, ...
Lire la suiteThis book constitutes the refereed proceedings of the 17th International Annual Conference on Cyber Security, CNCERT 2021, ...
Lire la suitePart 1 : Focuses on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges ...
Lire la suiteFocus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace ...
Lire la suiteThis book cover the following topics: emergency response, mobile internet security, IoT security, cloud security, threat ...
Lire la suiteThis groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical ...
Lire la suiteTechnical Systems-of-Systems (SoS) – in the form of networked, independent constituent computing systems temporarily collaborating ...
Lire la suiteThis book is about public open spaces, about people, and about the relationship between them and the role of technology in ...
Lire la suiteThis book is, perhaps, the first attempt to present a unified exposition of the subject and methodology of cybernetical physics ...
Lire la suiteWritten by an experienced cybersecurity lawyer and law professor, the second edition includes new and expanded information ...
Lire la suiteImportant and cost-effective innovations can substantially increase cyber risk and the loss of intellectual property, corporate ...
Lire la suiteThis book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by ...
Lire la suite