Proceedings of the NATO Advanced Research Workshop on Rescue of Sturgeon Species by means of Transboundary Integrated Water ...
Lire la suite
The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Lire la suite
Cities tend to become more crowded, the high rise buildings taller, the traffic nodes more complex. The volume of hazardous ...
Lire la suite
Software reuse as an umbrella concept has been around for several decades. Over time, new techniques and approaches have ...
Lire la suite
Reviews of Physiology, Biochemistry and Pharmacology Volume 160 2008 V. di Marzo: Endocannabinoids: Synthesis and Degradation ...
Lire la suiteThis book provides new conceptualisations on the networks of migrants and their descendants in accessing the labour market. ...
Lire la suite
In Risk Parity: How to Invest for All Market Environments, accomplished investment consultant Alex Shahidi delivers a powerful ...
Lire la suite
This mechanism of programmed cell death plays an important role in normal development and control of cell numbers in mature ...
Lire la suite
The subject covers several technical fields such as runtime verification, runtime checking, runtime monitoring, and security ...
Lire la suite
This book explores if and how Russian policies towards the Far East region of the country – and East Asia more broadly ...
Lire la suite
It aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Lire la suite
This brief comparatively reviews the security and safety features of hotels and home sharing services. It reviews crime data, ...
Lire la suite
Provides a comprehensive update on the latest information and knowledge which emerged from translational and basic science ...
Lire la suite
This book constitutes the thoroughly refereed post-proceedings of 10 internationl workshops held as satellite events of the ...
Lire la suite
In this special edited volume, scholars with diverse backgrounds and conceptual frameworks explore how economic, political, ...
Lire la suiteThis book trains the next generation of scientists representing different disciplines to leverage the data generated during ...
Lire la suite
Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lire la suite
This book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lire la suite
the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lire la suite
This book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suite