Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
Demonstrates the critical role various areas play in supporting service computing processes, and furthers an increase in current research, best practices, and new directions in service computing technologies and applications.
Illustrates how technology in e-government saves individuals significant amounts of time and money, while adding value to citizens' experiences with government, thus better serving their needs. It provides comprehensive coverage of the issues facing managers, consultants, and practitioners in e-government, and assists them in formulating ICT strategies for use within their field.
Applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses' information and ensure privacy for their networks and databases.
Addresses the overall problems in society's major infrastructures, and the technologies that may be applied to overcome these problems. This title focuses on ways in which energy intensive but 'invisible' (to the general public) facilities can become green or greener.
Presents a compilation of articles discussing the benefits and challenges of digital information and library digitization. Scholars from around the globe investigate web application development, techniques for digital conversion, composition of digital libraries, digital environments, and much more.
Examines the IT standards conceptual model through insightful case studies that illustrate the factors affecting the performance of business processes. By offering organizations the opportunity to enhance process performance through IT standardization, it demonstrates the effectiveness of IT standards, and the applicable techniques for implementation and management of such practices.
Brings together definitive writings on CTE by some of the leading figures and by thinkers in the history, philosophy, practice and theories of the field. This book offers scholars and practitioners with knowledge, skills, and attitudes to succeed in the field of CTE.
Explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding.
Examines high-tech delivery of pedagogical content in a simulated environment that engenders a deeper learning in an entertaining manner. Containing research from international experts, this leading publication within the field bridges the gap between development and science.
Presents a comprehensive collection of quality of service mechanisms for various access technologies, and introduces existing and traditional approaches to traffic management for wireless technologies. With expert international contributions, this critical mass of knowledge covers both academic and industry-based state-of-the-art techniques and ongoing research.
Presents a comprehensive collection of recent findings in access technologies useful in the architecture of wireless networks. Based on research results from academia and industry, this innovative publication covers cutting-edge findings on topics such as 4G security, mobile technologies, and handover mechanisms.
Provides a collection of recent high-quality empirical studies related to the education and careers of women in engineering, science and technology. It provides cases on innovative approaches to attracting and supporting women in training courses, and discussions on the effectiveness of mentoring, role models, government policy, and initiatives by professional bodies.
Presenting computational intelligence methods for addressing supply chain issues, this book emphasises techniques that provide effective solutions to complex supply chain problems and exhibit superior performance to other methods of operations research.
Details the essential new developments in technology and management in the aviation industry. Specific and important advances in navigation, air traffic control, and environmental impact all make their way into this volume, which also focuses on management policies keeping up with new technology.
Illustrates the power of management engineering for quantitative managerial decision-making in healthcare settings. This understanding makes it possible, in turn, to predict performance and/or real resource requirements, allowing decision-makers to be truly proactive rather than reactive.
Offers a holistic approach to virtual communities, providing relevant theoretical frameworks and presenting the latest empirical research on virtual technology, infrastructures, content modeling, knowledge modeling, content management, context awareness, mobility, security and trust.
Provides innovative chapters on the growth of educational, scientific, and industrial research activities among chemists and chemical engineers and provides a medium for mutual communication between international academia and the industry.
Detailing the latest and most important advances in security standards, this introduces the differences between information security and network security. In addition, the book serves as an essential reference to students, researchers, practitioners and consultants in the area of social media, cyber security and information and communication technologies (ICT).
Presents foundational research, models, case studies and research results that researchers and scholars can port to their own environments to evolve their own research processes and studies. Chapters cover scenarios of intellectual disciplines and technological endeavors in which metaverse platforms are currently being used and will be used.
Discusses important concepts for public administration reform, taking into account the complex social, administrative, cultural, and legal problems of implementing modern digital systems. It defines empirical studies and methodologies for e-government research and identifies factors affecting the development and proliferation of e-government.
Offers an analytical, interdisciplinary examination of electronic governance implementation from theoretical and practical perspectives. Researchers in fields like computer science, information systems, and sociology, and practitioners in policy formulation, implementation, and IT and systems deployment will find useful insights for improving the effectiveness of government services.
Provides readers with the foundational knowledge needed to communicate safely and effectively with individuals from other countries and cultures via online media. Through a closer examination of the expanded global access to the Web, this book discusses the use and design of cross-cultural digital media and the future of the field for executives, marketers, researchers and educators.
A unique and important contribution to the literature on cyber crime, this book explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.