Electronic Books

Total Books: 21 - 40 /202
Australias Arc of Instability

The idea for this book emerged from a conversation between Vivian Forbes and Charles Eaton following two seminars held in ...

Lee mas
Axon Growth and Guidance

The complexarchitectureofneuronal networks togetherwith the extraordinary associated functions make the nervous system a ...

Lee mas
Beginning Information Cards and Cardspace

If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability ...

Lee mas
Bilinear Integrable Systems: From Classical to Quantum, Continuous to Discrete

Trained as a physicistin his home university Kyushu University, Professor Hirota earned his PhD in’61 at Northwestern University ...

Lee mas
Biological invaders in inland waters: Profiles, distribution, and threats

The book examines the identity, distribution, and impact of freshwater non-indigenous species and the dynamics of their invasion. ...

Lee mas
Biometric Authentication

Biometric authentication refers to identifying an individual based on his or her distinguishing physiological and/or behavioral ...

Lee mas
Biometric Systems

The use of computers to recognize humans from physical and behavioral traits dates back to the digital computer evolution ...

Lee mas
Biometric User Authentication for IT Security

Biometric User Authentication for IT Security: From Fundamentals to Handwriting conveys general principals of passive (physiological ...

Lee mas
Biometrics and Identity Management : First European Workshop, BIOID 2008, Roskilde, Denmark, May 7-9, 2008. Revised Selected Papers

This volume constitutes the post-conference proceedings of the First European Workshop on Biometrics and Identity Management, ...

Lee mas
Calvinisms First Battleground

A specifically Calvinist identity and theology emerged out of two key conflicts in the region: first, the fight to turn away ...

Lee mas
Certification and Security in Inter-Organizational E-Services

This collection of papers offers real-life application experiences, research results and methodological proposals of direct ...

Lee mas
NoIMG
Challenges and Negotiations for Women in Higher Education

There is much ambivalence in women’s experience of the academy as teachers and students. Although today many more women ...

Lee mas
Children and Peace From Research to Action

This book's multi-layered emphasis on context, structural determinants of peace and conflict, and use of research for action ...

Lee mas
Cisco Networks : Engineers' Handbook of Routing, Switching, and Security with IOS, NX-OS, and ASA / Chris Carthern, William Wilson, Noel Rivera

Overviews of the basic knowledge and skills needed by CCNA and CCNP exam takers. Prior familiarity with Cisco routing and ...

Lee mas
Communication in Plants

Plant neurobiology is a newly emerging field of plant sciences. It covers signalling and communication at all levels of biological ...

Lee mas
Communications and Multimedia Security (vol. # 3677)

This book constitutes the refereed proceedings of the 9th IFIP Ti6 Ti11 International Conference on Communications and Multimedia ...

Lee mas
Community and Identity in Contemporary Technosciences

This book provides new thinking on scientific identity formation. It thoroughly interrogates the concepts of community and ...

Lee mas
NoIMG
Complicities : A theory for subjectivity in the psychological humanities

The book examines how we might develop a more socially just psychological theory and practice, which is both systems work ...

Lee mas
Computer Security - ESORICS 2008 : 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...

Lee mas
Computer Security – ESORICS 2007

This book address issues such as data protection; security protocols; systems; web and network security; privacy; threat ...

Lee mas
Total Books: 21 - 40 /202