Electronic Books

Total Books: 5781 - 5800 /7403
Seasonal Forecasts, Climatic Change and Human Health : Health and Climate

Awareness that many key aspects of public health are strongly influenced by climate is growing dramatically, driven by new ...

Lee mas
NoIMG
Second Assessment of Climate Change for the Baltic Sea Basin

This book is an update of the first BACC assessment, published in 2008. It offers new and updated scientific findings in ...

Lee mas
NoIMG
Secondary Analysis of Electronic Health Records

This book trains the next generation of scientists representing different disciplines to leverage the data generated during ...

Lee mas
Secondary Metabolites in Soil Ecology

Secondary Metabolites in Soil Ecology focuses on the role of bacterial, fungal and plant secondary metabolites in soil ecosystems. ...

Lee mas
Secrets of the Old One

In March 1905, at approximately eight week intervals, the Editor of the noted German physics journal, Annalen der Physik, ...

Lee mas
Secure Data Management

Although a number of cryptography and security techniques have been around for quite some time, emerging technologies, such ...

Lee mas
Secure Data Management (vol. # 4165)

the use of new technologies has brought some privacy concerns. It becomes simpler to collect, store, and search personal ...

Lee mas
Secure Data Science : Integrating Cyber Security and Data Science / Bhavani Thuraisingham, Murat Kantarcioglu, Latifur Khan

Data science techniques being applied not only for cyber security but also for every application area—including healthcare, ...

Lee mas
Secure Group Communications Over Data Networks

This book provides a concise survey of principles and state-of-the-art techniques for secure group communications (SGC) over ...

Lee mas
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks

Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks presents the latest research results ...

Lee mas
Secure Systems Development with UML

Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical ...

Lee mas
Secure Transaction Protocol Analysis : Models and Applications

The present volume arose from the need for a comprehensive coverage of the state of the art in security protocol analysis. ...

Lee mas
Security And Privacy For Big Data, Cloud Computing And Applications

Examines various topics and approaches related to the security and privacy in big data and cloud computing, where authors ...

Lee mas
Security Protocols (vol. # 3364)

Theme this time was “Where have all the Protocols gone?” Once upon a time security protocols lived mainly in the network ...

Lee mas
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Lee mas
Security and Privacy in Communication Networks

This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on ...

Lee mas
Security and Privacy in Digital Rights Management

This book about the ACM Workshop on Security and Privacy in Digital Rights Management is the ?rst scienti?c workshop with ...

Lee mas
Security and Privacy in Dynamic Environments

International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and ...

Lee mas
Security and Privacy in the Age of Ubiquitous Computing

The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The ...

Lee mas
Security and Trust Management : 16th International Workshop, STM 2020, Guildford, UK, September 17–18, 2020, Proceedings

This book constitutes the proceedings of the 16th International Workshop on Security and Trust Management, STM 2020, co-located ...

Lee mas
Total Books: 5781 - 5800 /7403