OPEN EDUCATIONAL RESOURCES

UPA PERPUSTAKAAN UNEJ | NPP. 3509212D1000001

  • Home
  • Admin
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
  • General Material Designation
    See More
  • Location
  • Language
Found 214 from your keywords: subject="security"
First Page Previous 16 17 18 19 20 Next Last Page
cover
Visual Cryptography for Image Processing and Security Theory, Methods, and A…
Comment Share
LIU, FengYAN, Wei Qi

This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…

Edition
-
ISBN/ISSN
978-3-319-23473-1
Collation
XVI, 167
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Violence in Nigeria Patterns and Trends
Comment Share
TAFT, PatriciaHAKEN, Nate

This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…

Edition
-
ISBN/ISSN
978-3-319-14935-6
Collation
XIV, 136
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Locating, Classifying and Countering Agile Land Vehicles; With Applications t…
Comment Share
David D. SworderJohn E. Boyd

This book examines real-time target tracking and identification algorithms with a focus on tracking an agile target. The authors look at several problems in which the tradeoff of accuracy and confidence must be made. These issues are explored within the context of specific tracking scenarios chosen to illustrate the tradeoffs in a simple and direct manner. The text covers the Gaussian wavelet e…

Edition
-
ISBN/ISSN
978-3-319-19431-8
Collation
-
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
The Fukushima Daiichi Nuclear Accident
Comment Share
Atomic Energy Society of Japan

Direct contributing factors of the catastrophic nuclear incident at Fukushima Daiichi NPP initiated by an unprecedented massive earthquake/ tsunami – inadequacies in tsunami measures, severe accident management, emergency response, accident recovery and mitigations – and the underlying factors - organizational issues, etc., have been clarified and recommendations in the following areas hav…

Edition
-
ISBN/ISSN
978-4-431-55160-7
Collation
XII, 560
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Understanding Network Hacks Attack and Defense with Python
Comment Share
BALILMAMM, Bastian

This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…

Edition
-
ISBN/ISSN
978-3-662-44437-5
Collation
26 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Uncertainty Quantification in Computational Fluid Dynamics and Aircraft Engines
Comment Share
MONTOMOLI, FrancescoCARNEVALE, MauroAMMARO, Antonio DMASSINI, MichelaSALVADORI, Simone

This book introduces novel design techniques developed to increase the safety of aircraft engines. The authors demonstrate how the application of uncertainty methods can overcome problems in the accurate prediction of engine lift, caused by manufacturing error. This in turn ameliorates the difficulty of achieving required safety margins imposed by limits in current design and manufacturing meth…

Edition
-
ISBN/ISSN
978-3-319-14681-2
Collation
18 b/w illustrations, 31 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Ultrasonic Nondestructive Evaluation Systems Industrial Application Issues
Comment Share
BURRASCANO, PietroCALLEGARI, SergioMONTISCI, AugustoRICCI, MarcoVERSACI, Mario

This book deals with a number of fundamental issues related to the practical implementation of ultrasonic NDT techniques in an industrial environment. The book discusses advanced academic research results and their application to industrial procedures. The text covers the choice and generation of the signals energizing the system to probe position optimization, from quality assessment evaluati…

Edition
-
ISBN/ISSN
978-3-319-10566-6
Collation
122 b/w illustrations, 117 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Tunnel Fire Dynamics
Comment Share
INGASON, HaukurZHEN LI, YingLONNERMARK, Anders

This book covers a wide range of issues in fire safety engineering in tunnels, describes the phenomena related to tunnel fire dynamics, presents state-of-the-art research, and gives detailed solutions to these major issues. Examples for calculations are provided. The aim is to significantly improve the understanding of fire safety engineering in tunnels. Chapters on fuel and ventilation control…

Edition
-
ISBN/ISSN
978-1-4939-2199-7
Collation
111 b/w illustrations, 21 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trustworthy Computing and Services International Conference, ISCTCS 2014, Be…
Comment Share
YUEMING, LuXI, ZhangYU, Wu

This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…

Edition
-
ISBN/ISSN
978-3-662-47401-3
Collation
206 b/w illustrations
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
cover
Trusted Systems 6th International Conference, INTRUST 2014, Beijing, China, …
Comment Share
YUNG, MotiZHU, LiehuangYANG, Yanjiang

Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…

Edition
-
ISBN/ISSN
978-3-319-27998-5
Collation
83 illustrations in colour
Series Title
-
Call Number
-
Availability0
Add to basket
MARC DownloadCite
First Page Previous 16 17 18 19 20 Next Last Page
OPEN EDUCATIONAL RESOURCES

Search

start it by typing one or more keywords for title, author or subject


Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?