The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Lire la suiteThis book presents new approaches for researching values as they are performed or materialized. Values have been an important ...
Lire la suite
It provides the tools for effective human resource management, summarized in the following seven success factors: demographic-oriented ...
Lire la suite
People use software and other technical systems in many ways, and a considerable amount of time and energy may be spent integrating ...
Lire la suite
Responsibility and Dependable Systems is the first book to examine the relationship between responsibility and system dependability. ...
Lire la suite
Sustainability and procurement Sustainable sourcing Responsible sourcing Purchasing Category management Operating models ...
Lire la suite
In Retargetable Processor System Integration into Multi-Processor System-on-Chip Platforms, such originally independent approaches ...
Lire la suite
The goal of this open access book is to develop an approach to clinical health care ethics that is more accessible to, and ...
Lire la suite
McInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Lire la suite
Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
Lire la suite
At a time when business demands urge companies to innovate and CIOs face increasing cost pressures, offshore delivery offers ...
Lire la suite
The main goal of this book is to make the reader familiar with the complexity and multi-dimensionality of the subject RISK, ...
Lire la suite
Economic growth and globalisation create traffic growth, leading to congestion, which again increases travel times and costs. ...
Lire la suite
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Lire la suite
For operators of nuclear research facilities, it is of particular importance to investigate minor incidents. The nuclear ...
Lire la suiteSafety is one of the most important issues today. Recent international standards such as ISO and IEC have consistently advocated ...
Lire la suite
This is a pioneering work. Recent disasters such as the tsunami disaster continue to demonstrate Professor Allinson’s thesis ...
Lire la suite
This book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Lire la suite
The scope of the workshop included the following topics: – design of distributed applications – development methodologies ...
Lire la suite
New data services are emerging every day, which also brings new challenges to protect data security. The internet and the ...
Lire la suite