for at udvide
kategorilisten.
Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
With the 1975 Cryogenic Engineering Conference this se ries enters the third decade of presenting the latest advances in the field of cryogenic engineering. The... Læs mere
Bemærk: Kan ikke leveres før jul.
Semantic Issues in e-Commerce Systems comprises the proceedings of the Ninth Working Conference on Database Semantics, which was sponsored by the International Federation for Information Processing (IFIP) and held in Hong Kong in April 2001.
Bemærk: Kan ikke leveres før jul.
The Handbook is a comprehensive research reference that is essential for anyone interested in conducting research in supply chain.
Bemærk: Kan ikke leveres før jul.
the nutrient requirements, feeding practices, and feeding environment are unique for fish. Feeding practices for several commercially important fishes representing diverse... Læs mere
Bemærk: Kan ikke leveres før jul.
Bemærk: Kan ikke leveres før jul.
The 7th Annual Working Conference of ISMSSS (lnformation Security... Læs mere
Bemærk: Kan ikke leveres før jul.
Dear readers, Although it is well-known that confidentiality, integrity and availability are high level objectives of information security, much of the attention in the security arena has been devoted to the confidentiality and availability aspects of security.
Bemærk: Kan ikke leveres før jul.
This publication is a collection of papers from the Third International Working Conference of IFIP TC-11 Working group 11.5 on "Integrity and Internal Control in Information systems".
Bemærk: Kan ikke leveres før jul.
Given the pervasive nature of information technology and information systems in the modern world, the design and development of IS and IT are critical issues of concern.
Bemærk: Kan ikke leveres før jul.
System Modelling and Optimization covers research issues within systems theory, optimization, modelling, and computing.
Bemærk: Kan ikke leveres før jul.
Archaeology can either bolster memory and tradition, or contradict the status quo and provide an alternative view of the past.
Bemærk: Kan ikke leveres før jul.
Others sessions are devoted to application like eSociety, TTP Management and PKI, Secure Workflow Environment, Secure Group Communications, and on the deployment of applications: Risk Management, Security Policies andTrusted System Design and Management.