This book focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and ...
Lire la suiteStudies the contribution of joint venture (JV) use as means of financing flexibility against the background of diverse financial ...
Lire la suiteThis book is not to be viewed as a scientific study; the aim of the authors and publishers is to familiarise foreign investors ...
Lire la suiteDistributed networks such as the Internet have altered the fundamental way a record is created, captured, accessed and managed ...
Lire la suiteOffers a trusted, completely updated source of information for education, training, and development of pharmacists. Published ...
Lire la suiteThe book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, ...
Lire la suiteThis book summarizes presentations and discussions from the two-day international workshop held at UC Berkeley in March 2015, ...
Lire la suiteThe book is discussing topics such as autonomy, incentives and trust, overlays and virtualization, load balancing and fault ...
Lire la suiteMcInerney’s and Day’s superb authors from various disciplines offer new and exciting views on knowledge acquisition, ...
Lire la suiteBrings together some of the best writing by leading authorities on many key topics, including benchmarking, lean quality, ...
Lire la suiteRule Breaker is a manifesto for a new wave of leadership. One that operates in flatter workplaces where command and control ...
Lire la suiteIt aims to warn policy-makers, industry, academia, civil society organisations, the media and the public about the threats ...
Lire la suiteThis book constitutes the refereed proceedings of the 9th VLDB Workshop on Secure Data Management held in Istanbul, Turkey, ...
Lire la suiteThis book is organized in topical sections on database security, trust management, privacy protection, and security and privacy ...
Lire la suiteExamines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...
Lire la suiteThis book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical ...
Lire la suiteYou hold in your hands the proceedings of ESAS 2007, the Fourth European Workshop on Security and Privacy in Ad hoc and Sensor ...
Lire la suiteThis book constitutes the refereed proceedings of the First International Conference on Security and Privacy in Digital Economy, ...
Lire la suiteThe IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...
Lire la suiteThis book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...
Lire la suite