Electronic Books

Total Books: 7081 - 7100 /8843
Security of Water Supply Systems: From Source to Tap

Recent reviews indicate the existence of significant vulnerabilities of all components of the infrastructure in general, ...

Lire la suite
Security with Noisy Data

Noisy data appears very naturally in applications where the authentication is based on physical identifiers, such as human ...

Lire la suite
Security, Privacy and Trust in Modern Data Management

In the context of this menace, Petkovic and Jonker provide a comprehensive guide to data management technologies with respect ...

Lire la suite
Sediment Dynamics and Pollutant Mobility in Rivers

In the ten chapters of this book, a broad set of practical process knowledge is p- sented, comprising simulation techniques, ...

Lire la suite
NoIMG
Seeds for Diversity and Inclusion : Agroecology and Endogenous Development

This book will contribute to a more nuanced debate around seed system resilience that goes beyond the dominant dichotomous ...

Lire la suite
NoIMG
Seeing Ourselves Through Technology: How We Use Selfies, Blogs and Wearable Devices to See and Shape Ourselves

This book is open access under a CC BY license. Selfies, blogs and lifelogging devices help us understand ourselves, building ...

Lire la suite
Seeking a Richer Harvest

Traditional approaches to the "intensification question" emphasize population pressure, climate change, bureaucratic management, ...

Lire la suite
Selected Areas in Cryptography

Design and analysis of symmetric key cryptosystems. – Primitives for symmetric key cryptography, including block and stream ...

Lire la suite
Selected Areas in Cryptography (vol. # 3897)

This volume contains the papers presented at the SAC 2005, was the 12th in a series of annual workshops on Selected Areas ...

Lire la suite
Selected Areas in Cryptography ; 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers

These are the proceedings of SAC 2006, the thirteenth annual workshop on Selected Areas in Cryptography. The workshop was ...

Lire la suite
Selected Areas in Cryptography ; 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers

SAC 2007 was the 14th in a series of annual workshops on Selected Areas in Cryptography. This is the ?rst time this workshop ...

Lire la suite
Selected Aspects of Cancer Progression: Metastasis, Apoptosis and Immune Response

The processes of tumor metastasis, apoptosis and anti-tumor immune response are among the most complex yet rapidly advancing ...

Lire la suite
Selection Methods in Plant Breeding

Written for plant breeders, researchers and post-graduate students, this book provides a comprehensive review of the methods ...

Lire la suite
Selection and Breeding Programs in Aquaculture

Although aquaculture as a biological production system has a long history, systematic and efficient breeding programs to ...

Lire la suite
Selective Sweep

Selective Sweep deals with the theory and practice of detection of recent adaptive evolution at the genomic level from the ...

Lire la suite
Selenium

Selenium is an essential trace element in the diet of humans and many other life forms. As discussed in this book, selenium ...

Lire la suite
Selenium in Food and Health

The second edition of Selenium in Food and Health takes into account the considerable amount of fresh information that has ...

Lire la suite
Self Healing Materials : An Alternative Approach to 20 Centuries of Materials Science

This book, the first in this new field of materials science, aims to present a coherent picture of the design principles ...

Lire la suite
Self and Other: Essays in Continental Philosophy of Religion

The essays in this volume focus on some of the topics that are shaping recent continental philosophy of religion, including ...

Lire la suite
Self and Substance in Leibniz

There is a close connection in Gottfried Wilhelm Leibniz’s mind between the notions of self and substance. R. W. Meyer, ...

Lire la suite
Total Books: 7081 - 7100 /8843