This work adds a new perspective to the stream of organizational IT security risk management literature, one that sheds light on the importance of IT security risk perceptions. Based on a large-scale empirical study of Cloud providers located in North America, the study reveals that in many cases, the providers’ decision makers significantly underestimate their services’ IT security risk ex…
This book presents extensive information related to the history of IUTAM. The initial chapters focus on IUTAM’s history and selected organizational aspects. Subsequent chapters provide extensive data and statistics, while the closing section showcases photos from all periods of the Union’s history. The history of IUTAM, the International Union on Theoretical and Applied Mechanics, began …
This book presents the most interesting talks given at ISSE 2015 – the forum for the interdisciplinary discussion of the key European Commission security objectives and policy directions. The topics include: · Encrypted Communication · Trust Services, eID and Cloud Security · Industrial Security and Internet of Things · Cybersecurity, Cybercrime…
This book highlights research in flood related areas and sustainable management conducted by researchers around the world, compiling their innovative work in order to share best practices for managing floods and recommended flood solutions. The individual papers cover the fundamentals and latest advances in the areas of flood research and management, providing in-depth coverage complemented by …
The book you hold in your hands is the outcome of the “2014 Interdisciplinary Symposium on Complex Systems” held in the historical city of Florence. The book consists of 37 chapters from 4 areas of Physical Modeling of Complex Systems, Evolutionary Computations, Complex Biological Systems and Complex Networks. All 4 parts contain contributions that give interesting point of view on complexi…
This book describes the life cycle process of IP cores, from specification to production, including IP modeling, verification, optimization, and protection. Various trade-offs in the design process are discussed, including those associated with many of the most common memory cores, controller IPs and system-on-chip (SoC) buses. Readers will also benefit from the author’s practical coverage …
This book not only introduces the principles of INS, CNS and GNSS, the related filters and semi-physical simulation, but also systematically discusses the key technologies needed for integrated navigations of INS/GNSS, INS/CNS, and INS/CNS/GNSS, respectively. INS/CNS/GNSS integrated navigation technology has established itself as an effective tool for precise positioning navigation, which can m…
This is a meticulously detailed chronological record of significant events in the history of medical informatics and their impact on direct patient care and clinical research, offering a representative sampling of published contributions to the field. The History of Medical Informatics in the United States has been restructured within this new edition, reflecting the transformation medical i…
This book contains the extended and revised versions of selected papers from the 4th International Symposium on Business Modeling and Software Design, BMSD 2014, held in Luxembourg, Luxembourg, in June 2014. The symposium was organized and sponsored by the Interdisciplinary Institute for Collaboration and Research on Enterprise Systems and Technology (IICREST), in collaboration with the Public …
This book provides a comprehensive overview of the field of Higgs boson physics. It offers the first in-depth review of the complete results in connection with the discovery of the Higgs boson at CERN’s Large Hadron Collider and based on the full dataset for the years 2011 to 2012. The fundamental concepts and principles of Higgs physics are introduced and the important searches prior to the …