You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Nas últimas décadas a comunidade internacional passou a externar maior preocupação com o crescimento das organizações criminosas. Aquilo que era uma movimentação nacionalista, quase agrária, com características especialmente marcantes na China, Itália e nos Estados Unidos, existente desde a idade média na Europa e no Oriente, cravou tentáculos mercantilistas em uma sociedade globalizada, ganhando corpo de atividade multinacional. As grandes corporações do crime, agora com nova e mutável dinâmica, passaram a dominar sociedades menos articuladas e gerar prejuízos consideráveis nas principais economias do mundo. A violência, sua marca registrada, determinou mortes, sequestros, extorsões, envolvendo importantes figuras nos quatro cantos do mundo. Ações terroristas vêm sendo coordenadas em todos os pontos do planeta. Intrincadas operações de lavagem de capitais fazem circular, no mundo moderno, em mãos dos chefes do crime, ao menos um quarto do dinheiro existente na comunidade internacional. In Nota dos Coordenadores
Learn about the latest federally supported research on ethnicity and drug use The National Institute on Drug Abuse has supported professional research into variation among ethnic groups’ use, abuse, and recovery from alcohol, tobacco, and other drugs, as well as research into perceptions of and readiness for treatment. 21st Century Research on Drugs and Ethnicity: Studies Supported by the National Institute on Drug Abuse takes a detailed look at the research performed in the last three years to help provide evidence-based and culturally competent counseling and treatment for individuals suffering from substance abuse/addiction syndromes. Top researchers discuss crucial unique issues in eth...
None
None
This book constitutes the proceedings of the 9th International Workshop on Frontiers in Algorithmics, FAW 2015, held in Guilin, China, in July 2015. The 28 papers presented in this volume were carefully reviewed and selected from 65 submissions. They deal with graph algorithms, approximation algorithms, combinatorial optimization, parameterized algorithms, and online algorithms.
This book constitutes the refereed proceedings of the 12th Latin American Robotics Symposium and Third Brazilian Symposium on Robotics, LARS 2015 / SBR 2015, held in Uberlândia, Brazil, in October/November 2015. The 17 revised full papers presented were carefully reviewed and selected from 80 submissions. The selected papers present a complete and solid reference of the state-of-the-art of intelligent robotics and automation research, covering the following areas: autonomous mobile robots, tele-operated and telepresence robots, human-robot interaction, trajectory control for mobile robots, autonomous vehicles, service-oriented robotic systems, semantic mapping, environment mapping, visual odometry, applications of RGB-D sensors, humanoid and biped robots, Robocup soccer robots, robot control, path planning, multiple vehicles and teams of robots. /div
This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The 29 revised full papers were carefully reviewed and selected from 95 submissions. The papers cover a wide range of topics in mathematics, computer science and security applications, including authentication and digital signatures, privacy, encryption and hash-function algorithms, security analysis, network security, access control, security devices, pairing and elliptic curve based security practice, security computation and so forth.
This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.