A guide and collection of ideas and time-proven concepts, the book highlight ways on how to accelerate a company, boost competitiveness, ...
Lire la suiteThe authors, a uniquely skilled team of longtime industry experts, detail how you can build privacy into products, processes, ...
Lire la suiteThis book discusses the current role of smallholders in connection with food security and poverty reduction in developing ...
Lire la suiteThe papers included in this volume cover a broad spectrum of important safety issues. They provide a combination of industrial ...
Lire la suiteIt offers a glimpse into the opening door of semantic technologies by means of concentrated examples of semantic applications ...
Lire la suiteThe vision of the Semantic Web is to enhance today’s Web via the exploi- tion of machine-processable metadata. The explicit ...
Lire la suiteThis book contains a selection of papers presented at the Advanced Research Workshop on ‘The Socio-economic causes and ...
Lire la suiteThis study mainly deals with the impact of financial performance on the dividend distribution of the two Syrian telecom companies, ...
Lire la suiteThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lire la suiteThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lire la suiteThis three-volume set, LNCS 12550, 12551, and 12552, constitutes the refereed proceedings of the 18th International Conference ...
Lire la suiteThis book constitutes the thoroughly refereed proceedings of the 10th Theory of Cryptography Conference, TCC 2013, held in ...
Lire la suiteThe papers are organized in 16 sessions dealing with the paradigms, approaches and techniques used to conceptualize, define ...
Lire la suiteYou'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services ...
Lire la suiteThe LNCS 10805 and 10806 proceedings set constitutes the proceedings of the 24th International Conference on Tools and Algorithms ...
Lire la suiteThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Lire la suiteThis book constitutes the proceedings of the 28th International Conference on Tools and Algorithms for the Construction and ...
Lire la suiteThis book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message ...
Lire la suiteThis book constitutes the refereed proceedings of the Cryptographers Track at the RSA Conference 2005, CT-RSA 2005, held ...
Lire la suiteThis book constitutes the refereed proceedings of the Cryptographers’ Track at the RSA Conference 2006,held in San Jose, ...
Lire la suite