Electronic Books

Total Books: 7081 - 7100 /8843
Security of Water Supply Systems: From Source to Tap

Recent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...

Lee mas
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

Lee mas
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

Lee mas
Sediment Dynamics and Pollutant Mobility in Rivers

In the ten chapters of this book, a broad set of practical process knowledge is p- sented, comprising simulation techniques, ...

Lee mas
NoIMG
Seeds for Diversity and Inclusion : Agroecology and Endogenous Development

This book will contribute to a more nuanced debate around seed system resilience that goes beyond the dominant dichotomous ...

Lee mas
NoIMG
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves

This book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...

Lee mas
Seeking a Richer Harvest

Traditional approaches to the "intensification question" emphasize population pressure, climate change, bureaucratic management, ...

Lee mas
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

Lee mas
Selected Areas in Cryptography (vol. # 3897)

This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...

Lee mas
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

Lee mas
Selected Areas in Cryptography ; 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...

Lee mas
Selected Aspects of Cancer Progression: Metastasis, Apoptosis and Immune Response

The processes of tumor metastasis, apoptosis and anti-tumor immune response are among the most complex yet rapidly advancing ...

Lee mas
Selection Methods in Plant Breeding

Written for plant breeders, researchers and post-graduate students, this book provides a comprehensive review of the methods ...

Lee mas
Selection and Breeding Programs in Aquaculture

Although aquaculture as a biological production system has a long history, systematic and efficient breeding programs to ...

Lee mas
Selective Sweep

Selective Sweep deals with the theory and practice of detection of recent adaptive evolution at the genomic level from the ...

Lee mas
Selenium

Selenium is an essential trace element in the diet of humans and many other life forms. As discussed in this book, selenium ...

Lee mas
Selenium in Food and Health

The second edition of Selenium in Food and Health takes into account the considerable amount of fresh information that has ...

Lee mas
Self Healing Materials : An Alternative Approach to 20 Centuries of Materials Science

This book, the first in this new field of materials science, aims to present a coherent picture of the design principles ...

Lee mas
Self and Other: Essays in Continental Philosophy of Religion

The essays in this volume focus on some of the topics that are shaping recent continental philosophy of religion, including ...

Lee mas
Self and Substance in Leibniz

There is a close connection in Gottfried Wilhelm Leibniz’s mind between the notions of self and substance. R. W. Meyer, ...

Lee mas
Total Books: 7081 - 7100 /8843