This proceedings volume constitutes an archive of the contributions of the key-speakers who attended the NATO Advanced Research ...
Lire la suiteopen access under a CC BY 4.0 license and reports on research carried out as part of the European Union co-funded C.O.N.T.A.C.T. ...
Lire la suiteComplex interactions of economic, technological, political, and cultural factors have fed the rise of criminal networks worldwide. ...
Lire la suiteThe two volume set LNCS 3686 and LNCS 3687 constitutes the refereedproceedings of the Third International Conference on Advances ...
Lire la suiteThis volume addresses the impact of the September 11th terror attacks on funded programs in policing. Comparing New York ...
Lire la suiteCrime prevention should be rational and should be based on the best possible evidence. Decision-makers should weigh heavily ...
Lire la suiteCrime prevention should be rational and should be based on the best possible evidence. Decision-makers should weigh heavily ...
Lire la suiteThis book constitutes the refereed proceedings of the 12th International Conference on the Theory and Application of Cryptographic ...
Lire la suiteThis book analyses the different types of post-execution punishments and other aggravated execution practices, the reasons ...
Lire la suiteThe book examines the consequences of the Italian Constitutional Court’s Judgment 238/2014 which denied the German Republic’s ...
Lire la suiteThis book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and ...
Lire la suiteThis open access edited collection examines representations of human trafficking in media ranging from British and Serbian ...
Lire la suiteResponsibility and Punishment, Third Edition presents a clear-headed defense of retributivism against several long-standing ...
Lire la suiteThis book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Lire la suiteThis brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
Lire la suiteThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Lire la suiteThis two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
Lire la suiteThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Lire la suite