NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2
hits: 17
1.
  • Bitcoin and Blockchain Secu... Bitcoin and Blockchain Security
    Karame, Ghassan O; Androulaki, Elli 2016, 2016.
    eBook

    Presenting a thorough overview and analysis of the security and privacy provisions of Bitcoin and its underlying blockchain clients, this thorough resource offers concrete solutions and ...
Full text
2.
  • KARAKTERISTIKE NOSILACA ULO... KARAKTERISTIKE NOSILACA ULOGA U ELEKTRONSKOM MALTRETIRANJU
    Opsenica Kostić, Jelena; Panić, Tanja; Cakić, Vanja Primenjena psihologija (Online), 07/2015, Volume: 8, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Istraživanje je sprovedeno s ciljem izdvajanja uloga učesnika u elektronskom maltretiranju, posebno uloge svedoka koja je u prethodnim istraživanjima često zanemarivana. Drugi cilj je bio ispitivanje ...
Full text

PDF
3.
  • Digitale Marktmacht (Editio... Digitale Marktmacht (Edition 1)
    Volmar, Maximilian 01/2019
    eBook
    Open access

    Der wachsende Einfluss der Internetplattformen des 21. Jahrhunderts in wirtschaftlicher, gesellschaftlicher und politischer Hinsicht hat eine Diskussion über die angemessene Regulierung dieser ...
Full text

PDF
4.
  • Transformationen des Konsum... Transformationen des Konsums : Vom industriellen Massenkonsum zum individualisierten Digitalkonsum (Edition 1)
    Baule, Bernward; Hohnsträter, Dirk; Krankenhagen, Stefan ... 01/2019
    eBook
    Open access

    Wohin entwickelt sich die Konsumgesellschaft? Wie ändern sich die Einstellungen und Verhaltensweisen der Verbraucherinnen und Verbraucher? Zeichnet sich ein Wandel vom industriellen Massenkonsum zum ...
Full text
5.
  • Cyber insecurity Cyber insecurity
    Harrison, Richard M; Herr, Trey 2016., 2016, 2016-10-18
    eBook

    Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks ...
Full text
6.
  • When digital becomes human When digital becomes human
    Belleghem, Steven Van 2015., 2015, 2015-04-03
    eBook

    In an age when customers have access to vast amounts of data about a company, its product and its competitors, customer experience becomes increasingly important as a sustainable source of ...
Full text
7.
  • Business process change: a ... Business process change: a business process management guide for managers and process professionals
    Harmon, Paul 04/2014
    eBook

    Business Process Change, 3rd Edition provides a balanced view of the field of business process change. Bestselling author Paul Harmon offers concepts, methods, cases for all aspects and phases of ...
Full text
8.
  • IT infrastructure model for e-learning
    Vujin Vladimir 05/2012
    Dissertation

    Provider: - Institution: - Data provided by Europeana Collections- E-learning is a complex system which includes distance learning, lectures, and classroom materials in various electronic forms; both ...
Full text
9.
  • Internet Policy and Economics Internet Policy and Economics
    Lehr, William H; Pupillo, Lorenzo Maria 2009, 2009-06-25, 20090401
    eBook

    For over a decade, William Lehr, Lorenzo Pupillo, and their colleagues in academia, industry, and policy have been on the electronic frontier, exploring the implications of the technologies that are ...
Full text
10.
  • Student relationship management model in E-education
    Vulić Marko 06/2013
    Dissertation

    Provider: - Institution: - Data provided by Europeana Collections- In modern e-learning systems student is the key subject that has the most important impact on learning process outcome. Student ...
Full text
1 2
hits: 17

Load filters