Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Functional and Constraint Logic Programming: 26th International Workshop, WFLP 2018, Frankfurt/Main, Germany, September 6, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11285))
Functional and Constraint Logic Programming: 26th International Workshop, WFLP 2018, Frankfurt/Main, Germany, September 6, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11285))
This book constitutes the refereed post-conference proceedings of the 26th International Workshop on Functional and Constraint Logic Programming, WFLP 2018, held in Frankfurt/Main, Germany, in September 2018. 

From the 19 full papers submitted,12 were accepted for presentation at the workshop. During a...

Putin's World: Russia Against the West and with the Rest
Putin's World: Russia Against the West and with the Rest
From renowned foreign policy expert Angela Stent comes a dissection of how Putin created a paranoid and polarized world -- and increased Russia's status on the global stage.


How did Russia manage to emerge resurgent on the world stage and play a weak...
Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11005))
Mobile, Secure, and Programmable Networking: 4th International Conference, MSPN 2018, Paris, France, June 18-20, 2018, Revised Selected Papers (Lecture Notes in Computer Science (11005))

This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Mobile, Secure, and Programmable Networking, held in Paris, France, in June 2018.

The 27 papers presented in this volume were carefully reviewed and selected from 52 submissions. They discuss new trends in...

Human-Centered Software Engineering: 7th IFIP WG 13.2 International Working Conference, HCSE 2018, Sophia Antipolis, France, September 3–5, 2018, ... (Lecture Notes in Computer Science (11262))
Human-Centered Software Engineering: 7th IFIP WG 13.2 International Working Conference, HCSE 2018, Sophia Antipolis, France, September 3–5, 2018, ... (Lecture Notes in Computer Science (11262))

This book constitutes the refereed post-conference proceedings of the 7th IFIP WG 13.2 International Conference on Human-Centered Software Engineering, HCSE 2018, held in Sophia Antipolis, France, in September 2018.

The 11 full papers and 7 short papers presented together with 5 poster and demo papers were carefully
...
The Social Meaning of Extra Money: Capitalism and the Commodification of Domestic and Leisure Activities (Dynamics of Virtual Work)
The Social Meaning of Extra Money: Capitalism and the Commodification of Domestic and Leisure Activities (Dynamics of Virtual Work)

Why do ordinary people who used to engage in domestic and leisure activities for free now try to make a profit from them? How and why do people commodify their free time? This book explores the marketization of blogging, cooking, craftwork, gardening, knitting, selling second-hand items, sexcamming, and more generally the economic...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
A Synthesis of Time: Zakat, Islamic Micro-finance and the Question of the Future in 21st-Century Indonesia
A Synthesis of Time: Zakat, Islamic Micro-finance and the Question of the Future in 21st-Century Indonesia

This book is an anthropological investigation into the different forms the economy assumes, and the different purposes it serves, when conceived from the perspective of Islamic micro-finance as a field of everyday practice. It is based on long-term ethnographic research in Java, Indonesia, with Islamic foundations active in managing...

Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Complete Guide to Digital Project Management: From Pre-Sales to Post-Production
Get a 360-degree view of digital project management. Learn proven best practices from case studies and real-world scenarios. A variety of project management tools, templates, models, and frameworks are covered.

This book provides an in-depth view of digital project management from initiation to execution to monitoring and
...
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You’ll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation,...

South Africa's Post-Apartheid Military: Lost in Transition and Transformation (Advanced Sciences and Technologies for Security Applications)
South Africa's Post-Apartheid Military: Lost in Transition and Transformation (Advanced Sciences and Technologies for Security Applications)
This timely book examines how the South African National Defence Force has adapted to the country’s new security, political and social environment since 1994. In South Africa’s changed political state, how has civilian control of the military been implemented and what does this mean for ‘defence in a democracy’? This...
The Second Mountain: The Quest for a Moral Life
The Second Mountain: The Quest for a Moral Life
#1 NEW YORK TIMES BESTSELLER • Everybody tells you to live for a cause larger than yourself, but how exactly do you do it? The author of The Road to Character explores what it takes to lead a meaningful life in a self-centered world.

“Deeply moving, frequently eloquent and
...
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Result Page: 76 75 74 73 72 71 70 69 68 67 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy