Extends recent work on entrepreneurship in response to adverse events to explore entrepreneurial responses by people who ...
Lire la suiteThe book begins with introductory chapters on the etiology of intersex conditions, conceptual clarification, legal issues, ...
Lire la suiteWhether they involve excess, a decrease, or complete absence, problems of sexual desire drive women to consult sex therapists, ...
Lire la suiteFoundations of Computer Security provides a succinct, yet authoritative introduction to the underlying theory, history, vocabulary, ...
Lire la suiteThis book is a documentation wide range of disciplines and experience, looking of an inspiring evening of design and discussion.
Lire la suiteThis book constitutes the refereed proceedings of the 8th Asia-Pacific Web Conference, APWeb 2006, held in Harbin, China ...
Lire la suiteThe theory of functional identities (FIs) is a relatively new one - the first results were published at the beginning of ...
Lire la suiteThis book a classic on the foundations of quantum theory. This view, which is essentially geometric and relies on the concept ...
Lire la suitePositioning analysis penetrates beneath surface issues to their underlying psychological causes and social effects, with ...
Lire la suiteThis book constitutes the refereed proceedings of the 4th International Conference on Global E-Security, ICGeS 2008, held ...
Lire la suiteSince the debut of the original edition, the Handbook of Psychodiagnostic Testing has been an invaluable aid to students ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThis book presents the most interesting talks given at ISSE 2006 - the forum for the interdisciplinary discussion of how ...
Lire la suiteThis book presents the most interesting talks given at ISSE/SECURE 2007 - the forum for the interdisciplinary discussion ...
Lire la suiteIndiscrete Thoughts gives a glimpse into a world that has seldom been described, that of science and technology as seen through ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th International Conference on Information Security Conference, ISC ...
Lire la suitehis volume contains the Research Track proceedings of the Second Information Security Practice and Experience Conference ...
Lire la suiteThis volume constitutes the refereed proceedings of the Second IFIP WG 11.2 International Workshop on Information Security ...
Lire la suiteThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19–21, 2005 at Jadavpur ...
Lire la suiteIntelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information ...
Lire la suite