This book is organized in topical sections on applied topic maps in industry and administration, visualisation and representation ...
Lire la suiteThis book presents the Scaling Management Framework, a model based on collected experiences from companies that have already ...
Lire la suiteIn this volume the methodological aspects of the scenario logic and probabilistic (LP) non-success risk management are considered. ...
Lire la suiteParalleling the public concern generated by high-profile school shootings and the growing dialogue about bullying, professionals ...
Lire la suitespecial emphasis was given to lessons for future thinking about the contribution of agriculture to: 1) poverty alleviation ...
Lire la suiteThis volume will be of interest and importance to researchers, agency personnel, and natural resource managers who are contemplating ...
Lire la suiteThis book covers comprehensive but fundamental principles and concepts of disaster and accident prevention and mitigation, ...
Lire la suiteThis book is organized in topical sections on query optimization in scientific databases, privacy, searching and mining graphs, ...
Lire la suiteThe present book on Sclerotinia deals with the aspects on taxonomy, nomenclature, geographical distribution, economic importance, ...
Lire la suiteFormed around a set of lectures presented at a NATO Advanced Study Institute (ASI), this book has grown in scope and in aspiration ...
Lire la suiteAlthough a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lire la suitethe use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...
Lire la suiteThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suiteThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Lire la suiteFeatures proceedings from the IFIP TC-11 WG 11.1 and WG 11.5 Joint Working Conference on Security Management, Integrity, ...
Lire la suiteThis book is organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and ...
Lire la suiteThis book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...
Lire la suiteInternational Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...
Lire la suiteThis book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, ...
Lire la suite